SlideShare a Scribd company logo
Killing	Multiple	Privacy	Birds	with	
One	Stone	
Greg	Reid	
AIIM	Board	of	Directors
Agenda	
•  Multiple	Data	Protection	Regulations	and	Multiple	
Differences	
•  Eight	Fair	Information	Practices	and	Principles	
•  Additional	Data	Protection	Principles	
•  And	there	really	isn’t	anything	new…	
•  Interesting	and	FUN	GDPR	Points
The	greatest	challenge	in	Privacy	and	establishing	a	environment	to	legally	
support	it	is	the	greatly	divergent	laws,	regulations,	and	expectations:	
	
•  Industries	/	Federal:	e.g.	HIPAA	/	HITECH	(Healthcare),	Gramm-Leach-Bliley	Act	(Financial),	
FERPA	(Education)	
•  Other	/	Federal:	e.g.	CAN-SPAM,	COPPA	
•  US	States:	e.g.	Massachusetts	(201	CMR	17.00),	California	(numerous…)	
•  US	Regulatory	Bodies:	e.g.	Federal	Trade	Commission,	Federal	Communications	Commission	
•  Other	Countries	and	Regions:	e.g.	EU	Directive	and	GDPR,	Canadian	PIPEDA,	China’s	CPL
So	Many,	Many	Differences	Across	Regulations	
•  The	definition	of	‘Personal’	data	
•  The	definition	of	‘Sensitive	Personal’	data	
•  The	definition	of	‘Anonymized’	data	(v.	Pseudonymized)	
•  The	definition	of	data	‘processing’	versus	simply	storing	/	managing	personal	data	
•  Pre-emption	Focus	(i.e.	Who	wins:	State	or	Federal	law?)	
•  The	definition	of	a	‘Breach’	and	what	constitutes	Breach	Notification	and	Timing	(and	what	
has	to	be	included	(or	not)	included	in	Breach	notifications)	
•  The	definition	of	‘Secure’	and	‘Security’	
•  GDPR-specific	requirements:	Right	to	Erasure,	Right	to	Halt	Processing,	Right	to	Transfer	
between	Data	Controllers,	etc.	
•  And	so	on…and	on.
Eight	Fair	Information	Practices	and	Principles	
OECD	(Organisation	for	Economic	Co-Operation):	Guidelines	on	the	Protection	of	Privacy	and	Trans-border	Flows	
of	Personal	Data	
	-	Annex	to	the	Recommendation	of	the	Council	of	23rd	September	1980	
	
1.	Collection	Limitation	Principle	
There	should	be	limits	to	the	collection	of	personal	data	and	any	such	data	should	be	obtained	by	lawful	(legitimate	means)	and	fair	
means	and,	where	appropriate,	with	the	knowledge	or	consent	of	the	data	subject.	
	
2.	Data	Quality	Principle	
Personal	data	should	be	relevant	to	the	purposes	for	which	they	are	to	be	used,	and,	to	the	extent	necessary	for	those	purposes,	
should	be	accurate,	complete	and	kept	up-to-date.	
	
3.	Purpose	Specification	Principle	
The	purposes	for	which	personal	data	are	collected	(e.g.	‘processed’)	…	and	the	subsequent	use(s)	(are)	limited	to	the	fulfilment	of	
those	purposes	…	and	as	are	specified	on	each	occasion	of	change	of	purpose.	
	
4.	Use	Limitation	Principle	
Personal	data	should	not	be	disclosed,	made	available	or	otherwise	used	(and	processed)	for	purposes	except:		
•  with	the	consent	of	the	data	subject;	or	
•  by	the	authority	of	law.
Eight	Fair	Information	Practices	and	Principles,	cont.	
5.	Security	Safeguards	Principle	
Personal	data	should	be	protected	by	reasonable	security	safeguards	against	such	risks	as	loss	or	unauthorised	access,	destruction,	use,	
modification	or	disclosure	of	data.	
		
6.	Openness	Principle	
There	should	be	a	general	policy	of	openness	about	developments,	practices	and	policies	with	respect	to	personal	data.	Means	should	be	
readily	available	of	establishing	the	existence	and	nature	of	personal	data,	and	the	main	purposes	of	their	use,	as	well	as	the	identity	and	
usual	residence	of	the	data	controller.	
		
7.	Individual	Participation	Principle:	An	individual	should	have	the	right	to:	
•  Obtain	from	a	data	controller,	or	otherwise,	confirmation	of	whether	or	not	the	data	controller	has	data	relating	to	him;	
•  Have	communicated	to	him,	data	relating	to	him	within	a	reasonable	time	…	in	a	reasonable	manner;	and	in	a	form	that	is	readily	
intelligible	to	him;	
•  Be	given	reasons	if	a	request	is	denied,	and	to	be	able	to	challenge	such	denial;	and	
•  To	challenge	data	relating	to	him	and,	if	the	challenge	is	successful	to	have	the	data	erased,	rectified,	completed	or	amended.	
		
8.	Accountability	Principle	
A	data	<owner>	should	be	accountable	for	complying	with	measures	which	give	effect	to	the	principles	stated	above.		
•  That	is,	have	an	effective	data	protection	/	privacy	compliance	program.
Some	Other	Common	Privacy	Regulatory	Threads	
		
1.	Breach	Handling	
•  Encryption	(in	transit/at	rest):	Your	Get	Out	of	Jail	Free	breach	card!	
		
2.	Obligations	of	3rd	Party	Processors	
		
3.	Enforcement	and	Penalties
Data	Protection	and	Privacy.	Nada	New!	
	Data	protection	and	privacy	are	the	operationalization	of:	
•  Information	management	
•  Information	governance	
•  Records	Management	
•  Information	Security	
•  (Very)	standard	compliance	approaches	
•  Some	IT	functionality	
•  Good	stewardship	and	Open	Communications	
•  Which	are	all	nothing	new	to	anyone	in	this	room	
		
And	if	you	need	budget	for	data/content	inventories,	records	management,	security	and	
controls,	etc.	
Privacy	is	a	great	place	to	look	for	it.
Some	Interesting	GDPR	Facts	
1.  A	simple	business	email	address	or	business	phone	number	of	an	individual	is	considered	personal	information	
under	the	GDPR.	The	US	(federal	or	state-based	laws)	has	no	such	rigorous	standards.	
2.  The	GDPR	is	different	from	most	US	privacy	regulations	in	that	it	constrains	how	companies	‘process’	data	on	
the	data	subject,	not	just	the	data	maintained/stored	reagarding	that	data	subject.	
3.  ‘Blinded	data’	(defined	as	‘Pseudonymized’	data	in	the	GDPR)	still	falls	under	GDPR	obligations.	Anonymized	data	
does	not.	
4.  There	are	numerous	similarities	between	HIPAA	and	GDPR	privacy	obligations;	if	a	HIPAA	compliance	program	
exists,	then	a	GDPR	effort	could	leverage	those	efforts	and	resources.	
5.  A	data	breach	notification	timeframe	under	the	GDPR,	especially	of	sensitive	data,	provides	for	only	72	hours.		
6.  The	 GDPR	 has	 enormous	 impacts	 on	 IT	 systems’	 functionalities.	 However,	 those	 impacts	 may	 be	 mitigated	
through	business	processes	based	on	risk	tolerance	and	incident	volumes.	
7.  Many	of	the	channels	of	information	transfer	to	the	US	(e.g.	SCCs)	will	most	likely	be	challenged	in	the	CJEU	in	the	
future.
Some	Interesting	GDPR	Facts,	cont.	
8.  Simply	viewing	EU	resident	personal	data	from	the	US	(e.g.	via	a	web	browser)	invokes	the	GDPR	if	that	data	is	
stored	in	the	EU.		
9.  Like	 many	 US	 regulations	 (e.g.	 HIPAA,	 again),	 the	 GDPR	 is	 the	 ‘ground	 floor’	 of	 data	 protection	 regulations.	
Individual	member	states	will	add	their	own	data	protection	obligations,	as	well.	
10.  Information	processing	is	not	grandfathered.	Data	processing	acceptable	today	may	not	be	after	May	25th	2018.	
11.  With	all	of	this	said,	there	are	many	derogations	and	exceptions	to	the	GDPR	requirements	and	obligations.	
12.  When	an	American	travels	to	the	EU	after	May	25th,	they	are	covered	by	the	GDPR!

More Related Content

Similar to [AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and EU laws - Greg Reid

Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
Adam Thierer
 
I’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docxI’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docx
donnajames55
 
The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)Craig Mullins
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
LAURA VIVET
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare Industry
EMMAIntl
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...DDMA
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy RegulationMercatus Center
 
GDPR Presentation
GDPR PresentationGDPR Presentation
GDPR Presentation
CILIP Ireland
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
shekharkanodia
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspectiveCraig Mullins
 
What is the General Data Protection Regulation (GDPR)?
What is the General Data Protection Regulation (GDPR)?What is the General Data Protection Regulation (GDPR)?
What is the General Data Protection Regulation (GDPR)?
TAG Alliances
 
Data Protection and Academic Research: The New GDPR Framework
Data Protection and Academic Research:  The New GDPR FrameworkData Protection and Academic Research:  The New GDPR Framework
Data Protection and Academic Research: The New GDPR Framework
David Erdos
 
data-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdfdata-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdf
kiruthigajawahar6
 
Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013
StampedeCon
 
Anne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for ResearchersAnne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for Researcherskclcompbio
 
Bridging the Gap Between Privacy and Retention
Bridging the Gap Between Privacy and RetentionBridging the Gap Between Privacy and Retention
Bridging the Gap Between Privacy and Retention
InfoGoTo
 
General data protection
General data protectionGeneral data protection
General data protection
BrijeshR3
 
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesTechnology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging Technologies
Infinity Software Solutions
 
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesTechnology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging Technologies
Infinity Software Solutions
 
2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...
2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...
2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...
Localogy
 

Similar to [AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and EU laws - Greg Reid (20)

Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
I’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docxI’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docx
 
The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare Industry
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy Regulation
 
GDPR Presentation
GDPR PresentationGDPR Presentation
GDPR Presentation
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 
What is the General Data Protection Regulation (GDPR)?
What is the General Data Protection Regulation (GDPR)?What is the General Data Protection Regulation (GDPR)?
What is the General Data Protection Regulation (GDPR)?
 
Data Protection and Academic Research: The New GDPR Framework
Data Protection and Academic Research:  The New GDPR FrameworkData Protection and Academic Research:  The New GDPR Framework
Data Protection and Academic Research: The New GDPR Framework
 
data-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdfdata-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdf
 
Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013
 
Anne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for ResearchersAnne Cameron - An Introduction to the Data Protection Act for Researchers
Anne Cameron - An Introduction to the Data Protection Act for Researchers
 
Bridging the Gap Between Privacy and Retention
Bridging the Gap Between Privacy and RetentionBridging the Gap Between Privacy and Retention
Bridging the Gap Between Privacy and Retention
 
General data protection
General data protectionGeneral data protection
General data protection
 
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesTechnology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging Technologies
 
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesTechnology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging Technologies
 
2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...
2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...
2017 PlaceConf: Location & Privacy - What Marketers Must Know (Future of Priv...
 

More from AIIM International

2022 IIM Infographic.pptx
2022 IIM Infographic.pptx2022 IIM Infographic.pptx
2022 IIM Infographic.pptx
AIIM International
 
Create, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueCreate, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational Value
AIIM International
 
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
AIIM International
 
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
AIIM International
 
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
AIIM International
 
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
AIIM International
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
AIIM International
 
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
AIIM International
 
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
AIIM International
 
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
AIIM International
 
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
AIIM International
 
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
AIIM International
 
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
AIIM International
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
AIIM International
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
AIIM International
 
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
AIIM International
 
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
AIIM International
 
[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions
AIIM International
 
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
AIIM International
 
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
AIIM International
 

More from AIIM International (20)

2022 IIM Infographic.pptx
2022 IIM Infographic.pptx2022 IIM Infographic.pptx
2022 IIM Infographic.pptx
 
Create, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueCreate, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational Value
 
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
 
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
 
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
 
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
 
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
 
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
 
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
 
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
 
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
 
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
 
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
 
[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions
 
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
 
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
 

Recently uploaded

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 

Recently uploaded (20)

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 

[AIIM18] Killing Multiple Privacy Birds With One Stone: Meeting both US and EU laws - Greg Reid