SlideShare a Scribd company logo
The Internet of Things – Automatski Corp.
http://www.automatski.com
E: Aditya@automatski.com , Founder & CEO
M:+91-9986574181
E: Shubhadeep.dev@automatski.com , Director - Sales
M: +91-8884074204
 Automatski is an IoT pioneer in many ways…
 With its ground up first principles based IoT Scale Platform
 With Infinions.io
 Autonomous Compute Platform ®
 Autonomous Machine Consumption Certified ®
 But Analyst count more than 180 IoT Platforms across the world
 An IoT Platform is a tough sell, even if you are cutting edge
 Hence we want to eliminate one more possibility of someone choosing others over us.
 The IoT Industry is filled with Paranoia about Security & Privacy concerns
 Hence we want to address Security and Privacy even within the foundations and early
stages of our Architecture and Existence as a Business
 That’s why we are doing this!
 Automatski is a front runner in addressing IoT Security & Privacy concerns, using
a combination of
 Research
 Standard Industry Practices
 Software Engineering Principles
 Operational Excellence
 Information technology - Security techniques - Code of practice for protection of
personally identifiable information (PII) in public clouds acting as PII processors
 This standard provides guidance aimed at ensuring that cloud service providers
(such as Amazon and Google) offer suitable information security controls to
protect the privacy of their customers’ clients by securing PII (Personally
Identifiable Information) entrusted to them.
 The Standard contains sets of controls that are intended to be implemented by cloud
service providers to ensure security. The Standard sets out controls including (amongst
others):
 information security policies;
 human resource security;
 access control;
 cryptography;
 physical and environmental security;
 operations security;
 communications security;
 supplier relationships;
 information security incident management;
 information security aspects of business continuity management; and
 compliance.
*** Not Legally Binding!
 Establishes controls over what personal information is collected, maintained, used
and disseminated by agencies in the executive branch of the Federal government.
 The Privacy Act only applies to records that are located in a “system of records.”
As defined in the Privacy Act, a system of records is “a group of any records under
the control of any agency from which information is retrieved by the name of the
individual or by some identifying number, symbol, or other identifying particular
assigned to the individual.”
 The Privacy Act guarantees three primary rights:
 The right to see records about oneself, subject to Privacy Act exemptions;
 The right to request the amendment of records that are not accurate, relevant, timely or
complete; and
 The right of individuals to be protected against unwarranted invasion of their privacy
resulting from the collection, maintenance, use, and disclosure of personal information.
 In January of this year the European Commission revealed a draft of its European
Data Protection Regulation to replace the previous Data Protection Directive.
 The Data Protection Directive is a European Union Directive, which was created
to regulate the progression of personal data within the European Union. Officially
known as the Directive 95/46/EC the legislation is part of the EU privacy and
human rights law.
 The aim of the new European Data Protection Regulation is to harmonise the
current data protection laws in place across the EU member states. The fact that
it is a “regulation” instead of a “directive” means it will be directly applicable to all
EU member states without a need for national implementing legislation.
1. Get your privacy policies, procedures and documentation in order and keep
them up to date: data protection authorities will be able to ask for these at any
time.
2. Form a governance group that oversees all your privacy activities, led by a
senior manager or executive. If you have over 250 employees, appoint a data
protection officer. The group should develop metrics to measure the status of
privacy efforts, report regularly and create statements of compliance that will
be required as part of your organization's annual report.
3. Implement a breach notification process and enhance your incident
management processes and your detection and response capabilities. Any data
breach must be notified to the relevant data protection authority, even if
protective measures, such as encryption, are in place; or the likelihood of harm
is low.
4. Prepare your organisation to fulfil the "right to be forgotten", "right to erasure"
and the "right to data portability". A strategy covering topics such as data
classification, retention, collection, destruction, storage and search will be
required – and it should cover all mechanisms by which data is collected,
including the internet, call centres and paper.
5. Create and enforce privacy throughout your systems' lifecycles to meet the
"privacy by design" requirement, whether you buy or develop. This will ensure
privacy controls are stronger, simpler to implement, harder to by-pass and
totally embedded in a system’s core functionality.
2015
•3rd Product
Release
•Privacy Act 1974
Compliance
2016
•4th/5th Product
Release
•ISO/IEC 27018
•EU Data
Protection
Regulation
 10-20+ years of Software Engineering experience each
 Global Agile & Technology Consulting, Advisory & Delivery experience of 10-15+ years since Agile and Tech was in
Infancy.
 The first computers we worked on were Atari and ZX Spectrum ;-) And yes after Basic we went to C/C++ and then
straight to Assembly Programming and then -> we began our journey as technologists
 Globally Distributed Global & Fortune Company work Experience
 Worked with companies like BCG, McKinsey, Fidelity, Tesco, Goldman Sachs…
 Long 3-5+ year projects & Over 200+ people globally distributed teams
 Led Double Digit Multi-Billion US$ Projects
 Blended methodology used comprising of Scrum, XP, Lean and Kanban
 From there we rode every wave J2EE, RUP, Six Sigma, CMMI, SIP, Mobile, Cloud, Big Data, Data Science etc…
 Individually worked with over 300+ Technologies at a time, literally nothing that scares us 
 Authors, Speakers, Coach’s, Mentors, Scientists, Engineers, Technologists, Marketing, Sales, HR, Finance…
 We are Generalists and we Always start with First Principles.
 Please refer to http://automatski.com for more information
 Please go through the 2 minute demo, 5 minute demo…
 And the showcase section of the website for more information…
 Or email us on aditya@automatski.com
 Or just give us a shout on Linkedin, Facebook, Twitter, Email etc.

More Related Content

What's hot

Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftMind the Byte
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
Prof. Jacques Folon (Ph.D)
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
skumartarget
 
Cs8792 cns - unit i
Cs8792   cns - unit iCs8792   cns - unit i
Cs8792 cns - unit i
ArthyR3
 
Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
PT Bank Syariah Mandiri
 
Prevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationPrevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data Regulation
Sophos Benelux
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
Keelan Stewart
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
Praveenkumar Hosangadi
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
Arab Federation for Digital Economy
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Gohsuke Takama
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
David Strom
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
Solix Technologies, Inc
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
IT Governance Ltd
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
Skyhigh Networks
 
IT Policy
IT PolicyIT Policy
Privacy by Design
Privacy by DesignPrivacy by Design
Privacy by Design
EnjoyDigitAll by BNP Paribas
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
IT Governance Ltd
 
101 Basic concepts of information security
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information security
SsendiSamuel
 

What's hot (20)

Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
Cs8792 cns - unit i
Cs8792   cns - unit iCs8792   cns - unit i
Cs8792 cns - unit i
 
Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
 
Data protection
Data protectionData protection
Data protection
 
Prevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationPrevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data Regulation
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
Infosec Law (Feb 2006)
Infosec Law (Feb 2006)Infosec Law (Feb 2006)
Infosec Law (Feb 2006)
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Privacy by Design
Privacy by DesignPrivacy by Design
Privacy by Design
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
 
101 Basic concepts of information security
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information security
 

Viewers also liked

Ict Expo Data Privacy Global Issues & Trends
Ict Expo Data Privacy Global Issues & TrendsIct Expo Data Privacy Global Issues & Trends
Ict Expo Data Privacy Global Issues & Trends
Charles Mok
 
Addressing Data Privacy Challenges In Global Applications
Addressing Data Privacy Challenges In Global ApplicationsAddressing Data Privacy Challenges In Global Applications
Addressing Data Privacy Challenges In Global Applications
Sambit Banerjee
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
FFRI, Inc.
 
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
jasonlan
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-CommerceJitendra Tomar
 

Viewers also liked (7)

Ict Expo Data Privacy Global Issues & Trends
Ict Expo Data Privacy Global Issues & TrendsIct Expo Data Privacy Global Issues & Trends
Ict Expo Data Privacy Global Issues & Trends
 
Gerimaks putilina
Gerimaks putilinaGerimaks putilina
Gerimaks putilina
 
Addressing Data Privacy Challenges In Global Applications
Addressing Data Privacy Challenges In Global ApplicationsAddressing Data Privacy Challenges In Global Applications
Addressing Data Privacy Challenges In Global Applications
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
 
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 

Similar to Automatski - The Internet of Things - Privacy Standards

Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
Enov8
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
Black Duck by Synopsys
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
Jason Lackey
 
PREPARING FOR THE GDPR
PREPARING FOR THE GDPRPREPARING FOR THE GDPR
PREPARING FOR THE GDPR
Annelore van der Lint
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
Matt Stubbs
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
Ulf Mattsson
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
Iryna Chekanava
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
Gary Dodson
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRShadi A. Razak
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
Symantec
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
Ulf Mattsson
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
Symantec
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
Symantec
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
Roy Biakpara, MSc.,CISA,CISSP,CISM,ISO27KLA
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
Adrian Dumitrescu
 
What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?
Cigniti Technologies Ltd
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
Peter Goldbrunner
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
Hokme
 

Similar to Automatski - The Internet of Things - Privacy Standards (20)

Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
PREPARING FOR THE GDPR
PREPARING FOR THE GDPRPREPARING FOR THE GDPR
PREPARING FOR THE GDPR
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 

More from automatskicorporation

Automatski - Physical Web
Automatski - Physical WebAutomatski - Physical Web
Automatski - Physical Web
automatskicorporation
 
Automatski - Beacon Management
Automatski  - Beacon ManagementAutomatski  - Beacon Management
Automatski - Beacon Management
automatskicorporation
 
Automatski - Open City
Automatski - Open CityAutomatski - Open City
Automatski - Open City
automatskicorporation
 
Automatski - Public WiFi
Automatski - Public WiFiAutomatski - Public WiFi
Automatski - Public WiFi
automatskicorporation
 
Automatski - Audio Video Conferencing
Automatski  - Audio Video ConferencingAutomatski  - Audio Video Conferencing
Automatski - Audio Video Conferencing
automatskicorporation
 
Automatski - Video Surveillance
Automatski - Video SurveillanceAutomatski - Video Surveillance
Automatski - Video Surveillance
automatskicorporation
 
Automatski - Digital Signage
Automatski - Digital SignageAutomatski - Digital Signage
Automatski - Digital Signage
automatskicorporation
 
Automatski - Invoicing & Payments
Automatski - Invoicing & PaymentsAutomatski - Invoicing & Payments
Automatski - Invoicing & Payments
automatskicorporation
 
Automatski - Asset Management Solution
Automatski - Asset Management SolutionAutomatski - Asset Management Solution
Automatski - Asset Management Solution
automatskicorporation
 
Automatski - Fleet Management Solution
Automatski - Fleet Management SolutionAutomatski - Fleet Management Solution
Automatski - Fleet Management Solution
automatskicorporation
 
Automatski - Telecare Solution
Automatski - Telecare SolutionAutomatski - Telecare Solution
Automatski - Telecare Solution
automatskicorporation
 
Automatski - Smart Meter Solution
Automatski - Smart Meter SolutionAutomatski - Smart Meter Solution
Automatski - Smart Meter Solution
automatskicorporation
 
Automatski - Smart Home Solution
Automatski - Smart Home SolutionAutomatski - Smart Home Solution
Automatski - Smart Home Solution
automatskicorporation
 
Automatski - Smart Building Solution
Automatski - Smart Building SolutionAutomatski - Smart Building Solution
Automatski - Smart Building Solution
automatskicorporation
 
Automatski - Remote Patient Management Solution
Automatski - Remote Patient Management SolutionAutomatski - Remote Patient Management Solution
Automatski - Remote Patient Management Solution
automatskicorporation
 
Automatski - Industrial Process Monitoring Solution
Automatski - Industrial Process Monitoring SolutionAutomatski - Industrial Process Monitoring Solution
Automatski - Industrial Process Monitoring Solution
automatskicorporation
 
Automatski - IoT Gateways & Hubs
Automatski - IoT Gateways & HubsAutomatski - IoT Gateways & Hubs
Automatski - IoT Gateways & Hubs
automatskicorporation
 
Automatski - The Internet of Things - Massively Distributed Realtime Machine ...
Automatski - The Internet of Things - Massively Distributed Realtime Machine ...Automatski - The Internet of Things - Massively Distributed Realtime Machine ...
Automatski - The Internet of Things - Massively Distributed Realtime Machine ...
automatskicorporation
 
Automatski - The Internet of Things - AutoSIM
Automatski - The Internet of Things - AutoSIMAutomatski - The Internet of Things - AutoSIM
Automatski - The Internet of Things - AutoSIM
automatskicorporation
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoT
automatskicorporation
 

More from automatskicorporation (20)

Automatski - Physical Web
Automatski - Physical WebAutomatski - Physical Web
Automatski - Physical Web
 
Automatski - Beacon Management
Automatski  - Beacon ManagementAutomatski  - Beacon Management
Automatski - Beacon Management
 
Automatski - Open City
Automatski - Open CityAutomatski - Open City
Automatski - Open City
 
Automatski - Public WiFi
Automatski - Public WiFiAutomatski - Public WiFi
Automatski - Public WiFi
 
Automatski - Audio Video Conferencing
Automatski  - Audio Video ConferencingAutomatski  - Audio Video Conferencing
Automatski - Audio Video Conferencing
 
Automatski - Video Surveillance
Automatski - Video SurveillanceAutomatski - Video Surveillance
Automatski - Video Surveillance
 
Automatski - Digital Signage
Automatski - Digital SignageAutomatski - Digital Signage
Automatski - Digital Signage
 
Automatski - Invoicing & Payments
Automatski - Invoicing & PaymentsAutomatski - Invoicing & Payments
Automatski - Invoicing & Payments
 
Automatski - Asset Management Solution
Automatski - Asset Management SolutionAutomatski - Asset Management Solution
Automatski - Asset Management Solution
 
Automatski - Fleet Management Solution
Automatski - Fleet Management SolutionAutomatski - Fleet Management Solution
Automatski - Fleet Management Solution
 
Automatski - Telecare Solution
Automatski - Telecare SolutionAutomatski - Telecare Solution
Automatski - Telecare Solution
 
Automatski - Smart Meter Solution
Automatski - Smart Meter SolutionAutomatski - Smart Meter Solution
Automatski - Smart Meter Solution
 
Automatski - Smart Home Solution
Automatski - Smart Home SolutionAutomatski - Smart Home Solution
Automatski - Smart Home Solution
 
Automatski - Smart Building Solution
Automatski - Smart Building SolutionAutomatski - Smart Building Solution
Automatski - Smart Building Solution
 
Automatski - Remote Patient Management Solution
Automatski - Remote Patient Management SolutionAutomatski - Remote Patient Management Solution
Automatski - Remote Patient Management Solution
 
Automatski - Industrial Process Monitoring Solution
Automatski - Industrial Process Monitoring SolutionAutomatski - Industrial Process Monitoring Solution
Automatski - Industrial Process Monitoring Solution
 
Automatski - IoT Gateways & Hubs
Automatski - IoT Gateways & HubsAutomatski - IoT Gateways & Hubs
Automatski - IoT Gateways & Hubs
 
Automatski - The Internet of Things - Massively Distributed Realtime Machine ...
Automatski - The Internet of Things - Massively Distributed Realtime Machine ...Automatski - The Internet of Things - Massively Distributed Realtime Machine ...
Automatski - The Internet of Things - Massively Distributed Realtime Machine ...
 
Automatski - The Internet of Things - AutoSIM
Automatski - The Internet of Things - AutoSIMAutomatski - The Internet of Things - AutoSIM
Automatski - The Internet of Things - AutoSIM
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoT
 

Recently uploaded

guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 

Recently uploaded (20)

guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 

Automatski - The Internet of Things - Privacy Standards

  • 1. The Internet of Things – Automatski Corp. http://www.automatski.com E: Aditya@automatski.com , Founder & CEO M:+91-9986574181 E: Shubhadeep.dev@automatski.com , Director - Sales M: +91-8884074204
  • 2.  Automatski is an IoT pioneer in many ways…  With its ground up first principles based IoT Scale Platform  With Infinions.io  Autonomous Compute Platform ®  Autonomous Machine Consumption Certified ®  But Analyst count more than 180 IoT Platforms across the world  An IoT Platform is a tough sell, even if you are cutting edge  Hence we want to eliminate one more possibility of someone choosing others over us.  The IoT Industry is filled with Paranoia about Security & Privacy concerns  Hence we want to address Security and Privacy even within the foundations and early stages of our Architecture and Existence as a Business  That’s why we are doing this!
  • 3.  Automatski is a front runner in addressing IoT Security & Privacy concerns, using a combination of  Research  Standard Industry Practices  Software Engineering Principles  Operational Excellence
  • 4.  Information technology - Security techniques - Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors  This standard provides guidance aimed at ensuring that cloud service providers (such as Amazon and Google) offer suitable information security controls to protect the privacy of their customers’ clients by securing PII (Personally Identifiable Information) entrusted to them.
  • 5.  The Standard contains sets of controls that are intended to be implemented by cloud service providers to ensure security. The Standard sets out controls including (amongst others):  information security policies;  human resource security;  access control;  cryptography;  physical and environmental security;  operations security;  communications security;  supplier relationships;  information security incident management;  information security aspects of business continuity management; and  compliance. *** Not Legally Binding!
  • 6.  Establishes controls over what personal information is collected, maintained, used and disseminated by agencies in the executive branch of the Federal government.  The Privacy Act only applies to records that are located in a “system of records.” As defined in the Privacy Act, a system of records is “a group of any records under the control of any agency from which information is retrieved by the name of the individual or by some identifying number, symbol, or other identifying particular assigned to the individual.”  The Privacy Act guarantees three primary rights:  The right to see records about oneself, subject to Privacy Act exemptions;  The right to request the amendment of records that are not accurate, relevant, timely or complete; and  The right of individuals to be protected against unwarranted invasion of their privacy resulting from the collection, maintenance, use, and disclosure of personal information.
  • 7.  In January of this year the European Commission revealed a draft of its European Data Protection Regulation to replace the previous Data Protection Directive.  The Data Protection Directive is a European Union Directive, which was created to regulate the progression of personal data within the European Union. Officially known as the Directive 95/46/EC the legislation is part of the EU privacy and human rights law.  The aim of the new European Data Protection Regulation is to harmonise the current data protection laws in place across the EU member states. The fact that it is a “regulation” instead of a “directive” means it will be directly applicable to all EU member states without a need for national implementing legislation.
  • 8. 1. Get your privacy policies, procedures and documentation in order and keep them up to date: data protection authorities will be able to ask for these at any time. 2. Form a governance group that oversees all your privacy activities, led by a senior manager or executive. If you have over 250 employees, appoint a data protection officer. The group should develop metrics to measure the status of privacy efforts, report regularly and create statements of compliance that will be required as part of your organization's annual report.
  • 9. 3. Implement a breach notification process and enhance your incident management processes and your detection and response capabilities. Any data breach must be notified to the relevant data protection authority, even if protective measures, such as encryption, are in place; or the likelihood of harm is low. 4. Prepare your organisation to fulfil the "right to be forgotten", "right to erasure" and the "right to data portability". A strategy covering topics such as data classification, retention, collection, destruction, storage and search will be required – and it should cover all mechanisms by which data is collected, including the internet, call centres and paper. 5. Create and enforce privacy throughout your systems' lifecycles to meet the "privacy by design" requirement, whether you buy or develop. This will ensure privacy controls are stronger, simpler to implement, harder to by-pass and totally embedded in a system’s core functionality.
  • 10. 2015 •3rd Product Release •Privacy Act 1974 Compliance 2016 •4th/5th Product Release •ISO/IEC 27018 •EU Data Protection Regulation
  • 11.
  • 12.  10-20+ years of Software Engineering experience each  Global Agile & Technology Consulting, Advisory & Delivery experience of 10-15+ years since Agile and Tech was in Infancy.  The first computers we worked on were Atari and ZX Spectrum ;-) And yes after Basic we went to C/C++ and then straight to Assembly Programming and then -> we began our journey as technologists  Globally Distributed Global & Fortune Company work Experience  Worked with companies like BCG, McKinsey, Fidelity, Tesco, Goldman Sachs…  Long 3-5+ year projects & Over 200+ people globally distributed teams  Led Double Digit Multi-Billion US$ Projects  Blended methodology used comprising of Scrum, XP, Lean and Kanban  From there we rode every wave J2EE, RUP, Six Sigma, CMMI, SIP, Mobile, Cloud, Big Data, Data Science etc…  Individually worked with over 300+ Technologies at a time, literally nothing that scares us   Authors, Speakers, Coach’s, Mentors, Scientists, Engineers, Technologists, Marketing, Sales, HR, Finance…  We are Generalists and we Always start with First Principles.
  • 13.  Please refer to http://automatski.com for more information  Please go through the 2 minute demo, 5 minute demo…  And the showcase section of the website for more information…  Or email us on aditya@automatski.com  Or just give us a shout on Linkedin, Facebook, Twitter, Email etc.