SlideShare a Scribd company logo
1 of 24
Download to read offline
#AIIM14	
  #AIIM14	
  
#AIIM14	
  
Ge#ng	
  Lost	
  in	
  the	
  Cloud:	
  	
  
Privacy	
  Risks	
  and	
  Cloud	
  Compu<ng*	
  
*with	
  apologies	
  to	
  Joni	
  Mitchell	
  
	
  
Else	
  Khoury	
  
Manager,	
  Informa8on	
  Management	
  Services/Freedom	
  of	
  Informa8on	
  and	
  Privacy	
  Coordinator	
  
Niagara	
  Region	
  
@ElseKhoury	
  
#AIIM14	
  
It’s	
  All	
  About	
  Me	
  
§  Freedom	
  of	
  Informa8on/Privacy	
  Coordinator	
  	
  
§  Regional	
  Municipality	
  of	
  Niagara	
  	
  
§  Federal	
  	
  	
  	
  	
  	
  Provincial	
  	
  	
  	
  	
  	
  Regional	
  	
  	
  	
  	
  	
  Municipal	
  
§  Public	
  health,	
  planning,	
  public	
  works,	
  Seniors	
  care	
  
§  Responsible	
  for	
  privacy	
  compliance	
  BUT	
  no	
  tangible	
  
authority,	
  inconsistent	
  compliance	
  measures	
  
§  Shameless	
  fear-­‐mongering:	
  it’s	
  kind	
  of	
  what	
  I	
  do	
  
	
  
#AIIM14	
  
Thank	
  you,	
  Edward	
  Snowden	
  
You	
  just	
  made	
  my	
  job	
  a	
  lot	
  easier	
  
#AIIM14	
  
Bows	
  and	
  flows	
  of	
  angel	
  hair,	
  	
  
ice	
  cream	
  castles	
  in	
  the	
  air	
  
I’ve	
  looked	
  at	
  Cloud	
  that	
  way	
  
§ Flexibility	
  	
  
§ BeOer	
  reliability	
  
§ Enhanced	
  collabora8on	
  	
  
§ Efficiency	
  in	
  deployment	
  	
  
§ Portability	
  	
  
§ Poten8al	
  cost	
  savings	
  	
  
§ Simpler	
  devices	
  	
  
	
  
#AIIM14	
  
But	
  now	
  they	
  only	
  block	
  the	
  sun,	
  
They	
  rain	
  and	
  snow	
  on	
  everyone	
  
Cloud	
  got	
  in	
  my	
  way	
  
§  Loss	
  of	
  control	
  by	
  customer	
  over	
  technology	
  infrastructure	
  /	
  
loss	
  of	
  governance	
  	
  
§  Possible	
  loss	
  of	
  control	
  over	
  loca8on	
  of	
  data	
  	
  
§  Concerns	
  about	
  segrega8on	
  of	
  data	
  	
  
§  Data	
  reten8on,	
  destruc8on	
  
§  Rights	
  to	
  data	
  	
  
§  Data	
  security	
  	
  
§  USA	
  Patriot	
  Act	
  
	
  
#AIIM14	
  
Caught	
  in	
  the	
  Cloud	
  
#AIIM14	
  
Privacy	
  Defined	
  
§  U.S.A.	
  	
  
Protec8on	
  of	
  Liberty,	
  i.e.,	
  protec8on	
  from	
  
government	
  
§  Canada	
  
Individual	
  autonomy	
  through	
  personal	
  control	
  of	
  
informa8on	
  
Privacy	
  Law	
  in	
  the	
  United	
  States,	
  the	
  EU	
  and	
  Canada:	
  The	
  Allure	
  of	
  the	
  Middle	
  Ground	
  	
  
Avner	
  Levin	
  and	
  Mary	
  Jo	
  Nicholson,	
  2005	
  
www.aiim.org/infochaos	
  
Do	
  YOU	
  understand	
  the	
  business	
  	
  
challenge	
  of	
  the	
  next	
  10	
  years?	
  
This	
  ebook	
  from	
  AIIM	
  President	
  
John	
  Mancini	
  explains.	
  
#AIIM14	
  
Canadian	
  Privacy	
  Laws	
  
§  Privacy	
  Act	
  (Federal)	
  
§  PIPEDA	
  (Personal	
  Informa8on	
  Protec8on	
  and	
  Electronic	
  
Documents	
  Act)	
  
Ontario:	
  
§  FIPPA	
  (Freedom	
  of	
  Informa8on	
  and	
  Protec8on	
  of	
  Privacy	
  Act)	
  
§  MFIPPA	
  (Municipal	
  Freedom	
  of	
  Informa8on	
  and	
  Protec8on	
  of	
  
Privacy	
  Act)	
  
§  PHIPA	
  (Personal	
  Health	
  Informa8on	
  Protec8on	
  Act)	
  
	
  
#AIIM14	
  
They’ve	
  looked	
  at	
  Cloud	
  from	
  both	
  
sides	
  now	
  
Chantal	
  Bernier,	
  
Federal	
  Privacy	
  
Commissioner	
  
Ann	
  Cavoukian,	
  
Informa8on/	
  
Privacy	
  Commissioner,	
  
Ontario	
  
Jill	
  Clayton,	
  
Informa8on/Privacy	
  
Commissioner,	
  
Alberta	
  
Elizabeth	
  Denham,	
  
Informa8on/Privacy	
  
Commissioner,	
  
Bri8sh	
  Colombia	
  
	
  
#AIIM14	
  
From	
  up	
  (federal)	
  
…Canadian	
  government	
  agencies	
  can	
  obtain	
  
personal	
  informa;on	
  held	
  in	
  Canada	
  about	
  
foreign	
  individuals,	
  just	
  as	
  a	
  foreign	
  
government	
  can	
  obtain	
  personal	
  informa;on	
  
that	
  may	
  be	
  held	
  in	
  that	
  country	
  about	
  
Canadians.	
  	
  
§ Privacy	
  Implica8ons	
  of	
  the	
  USA	
  Patriot	
  Act,	
  2004	
  
#AIIM14	
  
Ontario	
  
…There	
  will	
  always	
  be	
  law	
  enforcement	
  methods	
  and	
  
techniques	
  that	
  will	
  access	
  certain	
  types	
  of	
  
informa;on	
  here,	
  there	
  and	
  everywhere.	
  What	
  you	
  
should	
  concern	
  yourself	
  with	
  is	
  the	
  kind	
  of	
  
accountability	
  that	
  you	
  will	
  be	
  able	
  to	
  maintain	
  if	
  your	
  
e-­‐mail	
  systems	
  go	
  into	
  the	
  Cloud.	
  
§ Exploring	
  the	
  Future	
  of	
  E-­‐Mail,	
  Privacy	
  and	
  Cloud	
  Compu8ng,	
  
Ryerson	
  University,	
  Toronto,	
  2011	
  (Ontario)	
  
	
  
#AIIM14	
  
And	
  down	
  (B.C.)	
  
…personal	
  informa;on,	
  including	
  informa;on	
  
in	
  computer	
  logs	
  and	
  on	
  backup	
  tapes	
  or	
  drives	
  
cannot	
  be	
  stored	
  or	
  accessed	
  outside	
  of	
  
Canada…it	
  is	
  an	
  offence	
  to	
  store	
  or	
  allow	
  access	
  
to	
  personal	
  informa;on	
  outside	
  of	
  Canada	
  
unless	
  it	
  is	
  authorized.	
  	
  
§ Cloud	
  Compu8ng	
  Guidelines	
  for	
  Public	
  Bodies,	
  Office	
  of	
  the	
  Informa8on	
  and	
  
Privacy	
  Commissioner	
  for	
  Bri8sh	
  Colombia	
  
	
  
#AIIM14	
  
Alberta	
  
•  Compelling	
  a	
  witness	
  to	
  tes;fy	
  or	
  compelling	
  the	
  
produc;on	
  of	
  documents	
  can	
  only	
  be	
  in	
  response	
  to	
  
the	
  direc;on	
  of	
  a	
  court	
  tribunal	
  in	
  Canada	
  
•  Health	
  informa;on	
  can	
  only	
  be	
  disclosed	
  under	
  an	
  
order,	
  warrant,	
  or	
  subpoena	
  issued	
  by	
  a	
  court	
  
person	
  or	
  body	
  that	
  has	
  jurisdic;on	
  in	
  Alberta	
  
•  $500,000	
  penalty	
  	
  
§  The	
  Freedom	
  of	
  Informa8on	
  and	
  Protec8on	
  of	
  Privacy	
  Act	
  (FOIP)	
  
amendments	
  (2006)	
  
#AIIM14	
  
Penal<es/Repercussions	
  
§  Mandatory	
  privacy	
  breach	
  repor8ng	
  in	
  some	
  
provinces/sectors	
  
§  Most	
  governments	
  will	
  self-­‐report	
  (to	
  save	
  face)	
  
§  Fines	
  
§  Li8ga8on	
  (class	
  ac8on	
  law	
  suits	
  are	
  the	
  new	
  black)	
  
§  Nega<ve	
  media	
  aWen<on	
  
§  Loss	
  of	
  public	
  trust	
  
#AIIM14	
  
Accountability	
  
§  Services	
  can	
  be	
  outsourced,	
  but	
  
accountability	
  can’t	
  
§  An	
  ins8tu8on	
  is	
  responsible	
  for	
  the	
  
personal	
  (health)	
  informa8on	
  in	
  its	
  
custody	
  and	
  control	
  
	
  
#AIIM14	
  
Opera<onalizing	
  Accountability	
  
§  Strong	
  contracts:	
  
§  Define	
  confiden8al	
  informa8on	
  
§  Limit	
  disclosure/movement/exposure	
  
§  Outline	
  vendor’s	
  obliga8on	
  to	
  abide	
  by	
  legislated	
  
requirements	
  of	
  the	
  organiza8on	
  (privacy,	
  security,	
  
reten8on,	
  destruc8on)	
  
§  Privacy	
  Impact	
  Assessments	
  (PIA)	
  
§  Threat/Risk	
  Assessments	
  (TRAs)	
  
§  privacybydesign.ca	
  
#AIIM14	
  
Privacy	
  in	
  the	
  mainstream	
  
#AIIM14	
  
Real	
  changes	
  in	
  the	
  marketplace	
  
AHer	
  Snowden,	
  Privacy	
  Should	
  be	
  Profitable.	
  Ivor	
  Russell,	
  Globe	
  and	
  Mail.	
  August	
  30,	
  2013.	
  
	
  
#AIIM14	
  
#AIIM14	
  
	
  	
  
And	
  in	
  the	
  law?	
  
	
  When	
  we	
  decided	
  to	
  open	
  our	
  border	
  to	
  trade	
  with	
  
the	
  United	
  States,	
  we	
  did	
  so	
  with	
  a	
  free	
  trade	
  
agreement.	
  That	
  agreement	
  put	
  in	
  place	
  various	
  legal	
  
obliga;ons	
  and	
  a	
  dispute-­‐resolu;on	
  process.	
  This	
  is	
  
how	
  we	
  deal	
  with	
  our	
  interconnected	
  world.	
  If	
  we	
  can	
  
do	
  it	
  with	
  goods	
  and	
  services,	
  we	
  can	
  do	
  it	
  with	
  data.	
  	
  
Lisa	
  M.	
  Aus8n,	
  Heather	
  Black,	
  Michael	
  Geist,	
  Avner	
  Levin,	
  and	
  Ian	
  Kerr,	
  
Na8onal	
  Post,	
  December	
  12,	
  2013	
  
	
  
#AIIM14	
  
I	
  really	
  don’t	
  know	
  Cloud	
  at	
  all	
  	
  
#AIIM14	
  
Bring	
  an	
  Umbrella	
  
else.khoury@outlook.com	
  
	
  
www.aiim.org/infochaos	
  
Do	
  YOU	
  understand	
  the	
  business	
  	
  
challenge	
  of	
  the	
  next	
  10	
  years?	
  
This	
  ebook	
  from	
  AIIM	
  President	
  
John	
  Mancini	
  explains.	
  

More Related Content

What's hot

legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e businessKdnk Kiriti
 
The regulatory environment of electronic commerce
The regulatory environment of electronic commerceThe regulatory environment of electronic commerce
The regulatory environment of electronic commerceWisnu Dewobroto
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataAdler Law Group
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceNicholas Davis
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerceDamo Ward
 
Cyber law and introduction for undergrad
Cyber law and introduction for undergradCyber law and introduction for undergrad
Cyber law and introduction for undergradAzmawati Lazim
 
Privacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in WisconsinPrivacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in WisconsinBoyle_Fredrickson
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesAdam Thierer
 
The Legality of Electronic Signatures
The Legality of Electronic SignaturesThe Legality of Electronic Signatures
The Legality of Electronic SignaturesDocuSign
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy RegulationMercatus Center
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.vitor94
 
Be aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailLance Michalson
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethicalSheetal Verma
 
Combating Cyber Fraud, Data Breaches & Corporate Espionage
Combating Cyber Fraud, Data Breaches & Corporate EspionageCombating Cyber Fraud, Data Breaches & Corporate Espionage
Combating Cyber Fraud, Data Breaches & Corporate EspionageShawn Tuma
 

What's hot (20)

Washington's Privacy Tango
Washington's Privacy TangoWashington's Privacy Tango
Washington's Privacy Tango
 
Cyber law
Cyber lawCyber law
Cyber law
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
The regulatory environment of electronic commerce
The regulatory environment of electronic commerceThe regulatory environment of electronic commerce
The regulatory environment of electronic commerce
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
Cyber law and introduction for undergrad
Cyber law and introduction for undergradCyber law and introduction for undergrad
Cyber law and introduction for undergrad
 
Privacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in WisconsinPrivacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in Wisconsin
 
Blog Wars at New Media Expo
Blog Wars at New Media ExpoBlog Wars at New Media Expo
Blog Wars at New Media Expo
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
 
The Legality of Electronic Signatures
The Legality of Electronic SignaturesThe Legality of Electronic Signatures
The Legality of Electronic Signatures
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy Regulation
 
Legal Matters in E-commerce
Legal Matters in E-commerceLegal Matters in E-commerce
Legal Matters in E-commerce
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.
 
Be aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to email
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
Combating Cyber Fraud, Data Breaches & Corporate Espionage
Combating Cyber Fraud, Data Breaches & Corporate EspionageCombating Cyber Fraud, Data Breaches & Corporate Espionage
Combating Cyber Fraud, Data Breaches & Corporate Espionage
 

Viewers also liked

Grow your business by shaping the human impacts of technology
Grow your business by shaping the human impacts of technologyGrow your business by shaping the human impacts of technology
Grow your business by shaping the human impacts of technologyMichael Siepmann, Ph.D.
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computingHossam Zein
 
Addictive manufacturing
Addictive manufacturingAddictive manufacturing
Addictive manufacturingRudi Pivetta
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
 
Addictive printing or 3d printing
Addictive printing or 3d printingAddictive printing or 3d printing
Addictive printing or 3d printingSHUBHAM MORGAONKAR
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewragibhasan
 
Concerns with cloud computing
Concerns with cloud computingConcerns with cloud computing
Concerns with cloud computingUlf Mattsson
 
The shortest path to cloud success - your roadmap
The shortest path to cloud success - your roadmapThe shortest path to cloud success - your roadmap
The shortest path to cloud success - your roadmapGabe Akisanmi
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computingsaurabh soni
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Securityneicher
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computingragibhasan
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basicsRahul Gurnani
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple pptAgarwaljay
 

Viewers also liked (20)

Grow your business by shaping the human impacts of technology
Grow your business by shaping the human impacts of technologyGrow your business by shaping the human impacts of technology
Grow your business by shaping the human impacts of technology
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
How to Overcome Content Security Concerns in the Cloud
How to Overcome Content Security Concerns in the CloudHow to Overcome Content Security Concerns in the Cloud
How to Overcome Content Security Concerns in the Cloud
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
Addictive manufacturing
Addictive manufacturingAddictive manufacturing
Addictive manufacturing
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Addictive printing or 3d printing
Addictive printing or 3d printingAddictive printing or 3d printing
Addictive printing or 3d printing
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 
Cloud primer
Cloud primerCloud primer
Cloud primer
 
Concerns with cloud computing
Concerns with cloud computingConcerns with cloud computing
Concerns with cloud computing
 
The shortest path to cloud success - your roadmap
The shortest path to cloud success - your roadmapThe shortest path to cloud success - your roadmap
The shortest path to cloud success - your roadmap
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 

Similar to Privacy Concerns and Cloud Computing

How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Gary Kazmer
 
Government Notification of Data Breach
Government Notification of Data BreachGovernment Notification of Data Breach
Government Notification of Data BreachShawn Tuma
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoTLAURA VIVET
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )Megan Espinoza
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Dan Michaluk
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOIDan Michaluk
 
What's Exciting in Privacy
What's Exciting in PrivacyWhat's Exciting in Privacy
What's Exciting in PrivacyBrian Focht
 
DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfDEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
 
Public Records, Private Purposes
Public Records, Private PurposesPublic Records, Private Purposes
Public Records, Private PurposesAIIM International
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...FLUZO
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of PrivacyDiane Allen
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014
 

Similar to Privacy Concerns and Cloud Computing (19)

How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
 
Government Notification of Data Breach
Government Notification of Data BreachGovernment Notification of Data Breach
Government Notification of Data Breach
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOI
 
What's Exciting in Privacy
What's Exciting in PrivacyWhat's Exciting in Privacy
What's Exciting in Privacy
 
DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfDEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
 
Public Records, Private Purposes
Public Records, Private PurposesPublic Records, Private Purposes
Public Records, Private Purposes
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
 
PP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptxPP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptx
 
Data Privacy and Canadian Anti-Spam Law
Data Privacy and Canadian Anti-Spam LawData Privacy and Canadian Anti-Spam Law
Data Privacy and Canadian Anti-Spam Law
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 

More from AIIM International

Create, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueCreate, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueAIIM International
 
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...AIIM International
 
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...AIIM International
 
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...AIIM International
 
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...AIIM International
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
 
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...AIIM International
 
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...AIIM International
 
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...AIIM International
 
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence ChannelsAIIM International
 
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...AIIM International
 
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...AIIM International
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part TwoAIIM International
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...AIIM International
 
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...AIIM International
 
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...AIIM International
 
[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern SolutionsAIIM International
 
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...AIIM International
 
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...AIIM International
 

More from AIIM International (20)

2022 IIM Infographic.pptx
2022 IIM Infographic.pptx2022 IIM Infographic.pptx
2022 IIM Infographic.pptx
 
Create, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueCreate, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational Value
 
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
 
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
 
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
 
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
 
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
 
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
 
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
 
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
 
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
 
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
 
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
 
[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions
 
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
 
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Privacy Concerns and Cloud Computing

  • 1. #AIIM14  #AIIM14   #AIIM14   Ge#ng  Lost  in  the  Cloud:     Privacy  Risks  and  Cloud  Compu<ng*   *with  apologies  to  Joni  Mitchell     Else  Khoury   Manager,  Informa8on  Management  Services/Freedom  of  Informa8on  and  Privacy  Coordinator   Niagara  Region   @ElseKhoury  
  • 2. #AIIM14   It’s  All  About  Me   §  Freedom  of  Informa8on/Privacy  Coordinator     §  Regional  Municipality  of  Niagara     §  Federal            Provincial            Regional            Municipal   §  Public  health,  planning,  public  works,  Seniors  care   §  Responsible  for  privacy  compliance  BUT  no  tangible   authority,  inconsistent  compliance  measures   §  Shameless  fear-­‐mongering:  it’s  kind  of  what  I  do    
  • 3. #AIIM14   Thank  you,  Edward  Snowden   You  just  made  my  job  a  lot  easier  
  • 4. #AIIM14   Bows  and  flows  of  angel  hair,     ice  cream  castles  in  the  air   I’ve  looked  at  Cloud  that  way   § Flexibility     § BeOer  reliability   § Enhanced  collabora8on     § Efficiency  in  deployment     § Portability     § Poten8al  cost  savings     § Simpler  devices      
  • 5. #AIIM14   But  now  they  only  block  the  sun,   They  rain  and  snow  on  everyone   Cloud  got  in  my  way   §  Loss  of  control  by  customer  over  technology  infrastructure  /   loss  of  governance     §  Possible  loss  of  control  over  loca8on  of  data     §  Concerns  about  segrega8on  of  data     §  Data  reten8on,  destruc8on   §  Rights  to  data     §  Data  security     §  USA  Patriot  Act    
  • 6. #AIIM14   Caught  in  the  Cloud  
  • 7. #AIIM14   Privacy  Defined   §  U.S.A.     Protec8on  of  Liberty,  i.e.,  protec8on  from   government   §  Canada   Individual  autonomy  through  personal  control  of   informa8on   Privacy  Law  in  the  United  States,  the  EU  and  Canada:  The  Allure  of  the  Middle  Ground     Avner  Levin  and  Mary  Jo  Nicholson,  2005  
  • 8. www.aiim.org/infochaos   Do  YOU  understand  the  business     challenge  of  the  next  10  years?   This  ebook  from  AIIM  President   John  Mancini  explains.  
  • 9. #AIIM14   Canadian  Privacy  Laws   §  Privacy  Act  (Federal)   §  PIPEDA  (Personal  Informa8on  Protec8on  and  Electronic   Documents  Act)   Ontario:   §  FIPPA  (Freedom  of  Informa8on  and  Protec8on  of  Privacy  Act)   §  MFIPPA  (Municipal  Freedom  of  Informa8on  and  Protec8on  of   Privacy  Act)   §  PHIPA  (Personal  Health  Informa8on  Protec8on  Act)    
  • 10. #AIIM14   They’ve  looked  at  Cloud  from  both   sides  now   Chantal  Bernier,   Federal  Privacy   Commissioner   Ann  Cavoukian,   Informa8on/   Privacy  Commissioner,   Ontario   Jill  Clayton,   Informa8on/Privacy   Commissioner,   Alberta   Elizabeth  Denham,   Informa8on/Privacy   Commissioner,   Bri8sh  Colombia    
  • 11. #AIIM14   From  up  (federal)   …Canadian  government  agencies  can  obtain   personal  informa;on  held  in  Canada  about   foreign  individuals,  just  as  a  foreign   government  can  obtain  personal  informa;on   that  may  be  held  in  that  country  about   Canadians.     § Privacy  Implica8ons  of  the  USA  Patriot  Act,  2004  
  • 12. #AIIM14   Ontario   …There  will  always  be  law  enforcement  methods  and   techniques  that  will  access  certain  types  of   informa;on  here,  there  and  everywhere.  What  you   should  concern  yourself  with  is  the  kind  of   accountability  that  you  will  be  able  to  maintain  if  your   e-­‐mail  systems  go  into  the  Cloud.   § Exploring  the  Future  of  E-­‐Mail,  Privacy  and  Cloud  Compu8ng,   Ryerson  University,  Toronto,  2011  (Ontario)    
  • 13. #AIIM14   And  down  (B.C.)   …personal  informa;on,  including  informa;on   in  computer  logs  and  on  backup  tapes  or  drives   cannot  be  stored  or  accessed  outside  of   Canada…it  is  an  offence  to  store  or  allow  access   to  personal  informa;on  outside  of  Canada   unless  it  is  authorized.     § Cloud  Compu8ng  Guidelines  for  Public  Bodies,  Office  of  the  Informa8on  and   Privacy  Commissioner  for  Bri8sh  Colombia    
  • 14. #AIIM14   Alberta   •  Compelling  a  witness  to  tes;fy  or  compelling  the   produc;on  of  documents  can  only  be  in  response  to   the  direc;on  of  a  court  tribunal  in  Canada   •  Health  informa;on  can  only  be  disclosed  under  an   order,  warrant,  or  subpoena  issued  by  a  court   person  or  body  that  has  jurisdic;on  in  Alberta   •  $500,000  penalty     §  The  Freedom  of  Informa8on  and  Protec8on  of  Privacy  Act  (FOIP)   amendments  (2006)  
  • 15. #AIIM14   Penal<es/Repercussions   §  Mandatory  privacy  breach  repor8ng  in  some   provinces/sectors   §  Most  governments  will  self-­‐report  (to  save  face)   §  Fines   §  Li8ga8on  (class  ac8on  law  suits  are  the  new  black)   §  Nega<ve  media  aWen<on   §  Loss  of  public  trust  
  • 16. #AIIM14   Accountability   §  Services  can  be  outsourced,  but   accountability  can’t   §  An  ins8tu8on  is  responsible  for  the   personal  (health)  informa8on  in  its   custody  and  control    
  • 17. #AIIM14   Opera<onalizing  Accountability   §  Strong  contracts:   §  Define  confiden8al  informa8on   §  Limit  disclosure/movement/exposure   §  Outline  vendor’s  obliga8on  to  abide  by  legislated   requirements  of  the  organiza8on  (privacy,  security,   reten8on,  destruc8on)   §  Privacy  Impact  Assessments  (PIA)   §  Threat/Risk  Assessments  (TRAs)   §  privacybydesign.ca  
  • 18. #AIIM14   Privacy  in  the  mainstream  
  • 19. #AIIM14   Real  changes  in  the  marketplace   AHer  Snowden,  Privacy  Should  be  Profitable.  Ivor  Russell,  Globe  and  Mail.  August  30,  2013.    
  • 21. #AIIM14       And  in  the  law?    When  we  decided  to  open  our  border  to  trade  with   the  United  States,  we  did  so  with  a  free  trade   agreement.  That  agreement  put  in  place  various  legal   obliga;ons  and  a  dispute-­‐resolu;on  process.  This  is   how  we  deal  with  our  interconnected  world.  If  we  can   do  it  with  goods  and  services,  we  can  do  it  with  data.     Lisa  M.  Aus8n,  Heather  Black,  Michael  Geist,  Avner  Levin,  and  Ian  Kerr,   Na8onal  Post,  December  12,  2013    
  • 22. #AIIM14   I  really  don’t  know  Cloud  at  all    
  • 23. #AIIM14   Bring  an  Umbrella   else.khoury@outlook.com    
  • 24. www.aiim.org/infochaos   Do  YOU  understand  the  business     challenge  of  the  next  10  years?   This  ebook  from  AIIM  President   John  Mancini  explains.