SlideShare a Scribd company logo
BIG DATA
Big Data Overview: Security,
Privacy, Regulation
Charles Walker
April 16, 2014
BIG DATA
Potential Big Data Implications
• Conventional Wisdom on Big Data:
– Data should only be collected for an identified purpose
• First Commandment of Data Hygiene – “Thou shall not collect and hold onto personal information unnecessary
to an identified purpose.” – FTC Chairman Edith Ramirez, 2012
BIG DATA
Potential Big Data Implications
• Conventional Wisdom on Big Data:
– Data should only be collected for an identified purpose
• First Commandment of Data Hygiene – “Thou shall not collect and hold onto personal information unnecessary
to an identified purpose.” – FTC Chairman Edith Ramirez, 2012
• Another View of Big Data:
– “. . . big data refers to things one can do at a large scale that cannot be done at a smaller one, to
extract new insights or create new forms of value, in ways that change markets, organizations, the
relationship between citizens and governments, and more.”
Viktor Mayer-Schönberger and Kenneth Cukier, “Big Data: a revolution that will transform how we live, work
and think”, Houghton Mifflin Harcourt, 2013
BIG DATA
Potential Big Data Implications
• Conventional Wisdom on Big Data:
– Data should only be collected for an identified purpose
• First Commandment of Data Hygiene – “Thou shall not collect and hold onto personal information unnecessary
to an identified purpose.” – FTC Chairman Edith Ramirez, 2012
• Another View of Big Data:
– “. . . big data refers to things one can do at a large scale that cannot be done at a smaller one, to
extract new insights or create new forms of value, in ways that change markets, organizations, the
relationship between citizens and governments, and more.”
Viktor Mayer-Schönberger and Kenneth Cukier, “Big Data: a revolution that will transform how we live, work
and think”, Houghton Mifflin Harcourt, 2013
• Benefits From Big Data Innovations:
– “Because big data analysis involves finding correlations and patterns that might otherwise not be
observable, it almost necessarily involves uses of data that were not anticipated at the time the data
were collected.” Thomas M. Lenard and Paul H. Rubin, Technology Policy Institute: The Big Data Revolution:
Privacy Considerations, Technology Policy Institute, December 2013
BIG DATA
Identity Theft and Big Data?
• Big Data is thought to present risks for increased identity theft:
– Data Brokers Vulnerable to Black Market Identity Thieves: http://bit.ly/1emd51h
BIG DATA
Identity Theft and Big Data?
• Big Data is thought to present risks for increased identity theft:
– Data Brokers Vulnerable to Black Market Identity Thieves: http://bit.ly/1emd51h
• Overall Identity Theft has Actually Been Flat Since 2005:
– Overall incidence of identity fraud has been flat from 2005-2012
– Total $ lost to fraud fell from $29.1B ’05 – ’09 to $19.6B ‘10 –’12
– Only 15% of identity fraud is associated with data breaches/online causes
Thomas M. Lenard and Paul H. Rubin, Technology Policy Institute: The Big Data Revolution:Privacy
Considerations, Technology Policy Institute, December 2013
BIG DATA
Identity Theft and Big Data?
• Big Data is thought to present risks for increased identity theft:
– Data Brokers Vulnerable to Black Market Identity Thieves: http://bit.ly/1emd51h
• Overall Identity Theft has Actually Been Flat Since 2005:
– Overall incidence of identity fraud has been flat from 2005-2012
– Total $ lost to fraud fell from $29.1B ’05 – ’09 to $19.6B ‘10 –’12
– Only 15% of identity fraud is associated with data breaches/online causes
Thomas M. Lenard and Paul H. Rubin, Technology Policy Institute: The Big Data Revolution:Privacy
Considerations, Technology Policy Institute, December 2013
• Big Data Solutions Can Combat Identity Theft
– States Turn To Big Data Solution to Combat Tax Fraud: http://bit.ly/OFBx17
– IBM Using Big Data Solutions to Fight Big Business Fraud: http://bit.ly/OFvh9J
BIG DATA
Regulatory Challenges
• EU poised for sweeping changes in data protection for member states
– Draft of proposed law “ . . . based on the proposition that control of individual, personal data is a
fundamental human right, and includes the right to consent, the right to access, and the ‘right to be
forgotten,’ within limits.”
– Companies that violate laws regarding EU member data could face up to $136 M in fines
Big regulation poised to change big data - http://bit.ly/1l4I7ZS
BIG DATA
Regulatory Challenges
• EU poised for sweeping changes in data protection for member states
– Draft of proposed law “ . . . based on the proposition that control of individual, personal data is a
fundamental human right, and includes the right to consent, the right to access, and the ‘right to be
forgotten,’ within limits.”
– Companies that violate laws regarding EU member data could face up to $136 M in fines
Big regulation poised to change big data - http://bit.ly/1l4I7ZS
• US Policy Review on Data Collection Underway
– Edward Snowden’s leaks on NSA data collection have prompted reform on how metadata is collected
and accessed by intelligence agencies. http://bit.ly/1kvmAei
– WH Adviser John Podesta challenges private industry on transparency: http://on.wsj.com/Qdus9C
– Tech Giants Battle WH framing of data mining: http://bit.ly/1hH5c5U

More Related Content

What's hot

Data set module 4
Data set   module 4Data set   module 4
Data set module 4
Data-Set
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
Hubbamar
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
Data-Set
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
Data-Set
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Vivastream
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
Uc Man
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
AgeFriendlyEconomy
 
Miranda Marcus – Data and ethics
Miranda Marcus – Data and ethicsMiranda Marcus – Data and ethics
Miranda Marcus – Data and ethics
NEXTConference
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
Mary Aviles
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
Erik Kokkonen
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the future
Facundo Mauricio
 
Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.
jatharrison
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
Tom Walker
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
imehreenx
 
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Vivastream
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
AnuMarySunny
 
Big Data
Big DataBig Data
Big Data
cadmef
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect stormUlf Mattsson
 
piiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnierpiiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnier
pii2011
 

What's hot (20)

Data set module 4
Data set   module 4Data set   module 4
Data set module 4
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
Miranda Marcus – Data and ethics
Miranda Marcus – Data and ethicsMiranda Marcus – Data and ethics
Miranda Marcus – Data and ethics
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the future
 
Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Big Data
Big DataBig Data
Big Data
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
 
piiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnierpiiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnier
 
DMA Data Protection 2014
DMA Data Protection 2014DMA Data Protection 2014
DMA Data Protection 2014
 

Viewers also liked

Protección de Datos Personales
Protección de Datos PersonalesProtección de Datos Personales
Protección de Datos PersonalesRodrigo Rojas
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for Activists
Greg Stromire
 
The new data privacy regulation framework
The new data privacy regulation framework The new data privacy regulation framework
The new data privacy regulation framework Thiebaut Devergranne
 
Smau 2016 seminario privacy: Data Protection Officer, seminario alovisio go...
Smau 2016 seminario privacy:  Data Protection Officer,  seminario alovisio go...Smau 2016 seminario privacy:  Data Protection Officer,  seminario alovisio go...
Smau 2016 seminario privacy: Data Protection Officer, seminario alovisio go...
Mauro Alovisio
 
Personal Data Protection for your Church
Personal Data Protection for your ChurchPersonal Data Protection for your Church
Personal Data Protection for your Church
Benjamin Ck Ang
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
Arab Federation for Digital Economy
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
kevintsmith
 
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Data Con LA
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
Sophos Benelux
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis
 
Utilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewUtilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewKato Mivule
 
Google+ is here. What now?
Google+ is here. What now?Google+ is here. What now?
Google+ is here. What now?
Publicis Modem UK
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data mining
harithavijay94
 
IM242679
IM242679IM242679
IM242679
Vinrese Stewart
 
The Elevator-Floor Exiting Game
The Elevator-Floor Exiting GameThe Elevator-Floor Exiting Game
The Elevator-Floor Exiting Game
Vinrese Stewart
 
Jeopardy! (1997) and BrainSurge (2010) Brought to them by Easy Tech.
Jeopardy! (1997) and BrainSurge (2010) Brought to them by Easy Tech.Jeopardy! (1997) and BrainSurge (2010) Brought to them by Easy Tech.
Jeopardy! (1997) and BrainSurge (2010) Brought to them by Easy Tech.
Vinrese Stewart
 
(##)Steam power plant
(##)Steam power plant(##)Steam power plant
(##)Steam power plantNAGARAJ051
 
Nickelodeon's BrainSurge Countdown Timer
Nickelodeon's BrainSurge Countdown TimerNickelodeon's BrainSurge Countdown Timer
Nickelodeon's BrainSurge Countdown Timer
Vinrese Stewart
 
IM242213
IM242213IM242213
IM242213
Vinrese Stewart
 

Viewers also liked (20)

Protección de Datos Personales
Protección de Datos PersonalesProtección de Datos Personales
Protección de Datos Personales
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for Activists
 
The new data privacy regulation framework
The new data privacy regulation framework The new data privacy regulation framework
The new data privacy regulation framework
 
Smau 2016 seminario privacy: Data Protection Officer, seminario alovisio go...
Smau 2016 seminario privacy:  Data Protection Officer,  seminario alovisio go...Smau 2016 seminario privacy:  Data Protection Officer,  seminario alovisio go...
Smau 2016 seminario privacy: Data Protection Officer, seminario alovisio go...
 
Personal Data Protection for your Church
Personal Data Protection for your ChurchPersonal Data Protection for your Church
Personal Data Protection for your Church
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
 
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
Big Data Day LA 2016/ NoSQL track - Privacy vs. Security in a Big Data World,...
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
 
Utilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an OverviewUtilizing Noise Addition For Data Privacy, an Overview
Utilizing Noise Addition For Data Privacy, an Overview
 
Google+ is here. What now?
Google+ is here. What now?Google+ is here. What now?
Google+ is here. What now?
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data mining
 
IM242679
IM242679IM242679
IM242679
 
The Elevator-Floor Exiting Game
The Elevator-Floor Exiting GameThe Elevator-Floor Exiting Game
The Elevator-Floor Exiting Game
 
Jeopardy! (1997) and BrainSurge (2010) Brought to them by Easy Tech.
Jeopardy! (1997) and BrainSurge (2010) Brought to them by Easy Tech.Jeopardy! (1997) and BrainSurge (2010) Brought to them by Easy Tech.
Jeopardy! (1997) and BrainSurge (2010) Brought to them by Easy Tech.
 
(##)Steam power plant
(##)Steam power plant(##)Steam power plant
(##)Steam power plant
 
Nickelodeon's BrainSurge Countdown Timer
Nickelodeon's BrainSurge Countdown TimerNickelodeon's BrainSurge Countdown Timer
Nickelodeon's BrainSurge Countdown Timer
 
IM242213
IM242213IM242213
IM242213
 

Similar to Big data privacy security regulation

Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
mjsale781
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
caniceconsulting
 
Big Data - Marketing Gone Mad?
Big Data - Marketing Gone Mad?Big Data - Marketing Gone Mad?
Big Data - Marketing Gone Mad?
Technoledge
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big data
bis_foresight
 
The Future of Big Data
The Future of Big Data The Future of Big Data
The Future of Big Data
EMC
 
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
June 2015 (142)  MIS Quarterly Executive   67The Big Dat.docxJune 2015 (142)  MIS Quarterly Executive   67The Big Dat.docx
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
croysierkathey
 
The 3 Secrets of Online Privacy
The 3 Secrets of Online Privacy The 3 Secrets of Online Privacy
The 3 Secrets of Online Privacy
Laurent Liscia
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Shawn Tuma
 
Maximizing & Exploiting Big Data in Digital Media....Legally
Maximizing & Exploiting Big Data in Digital Media....LegallyMaximizing & Exploiting Big Data in Digital Media....Legally
Maximizing & Exploiting Big Data in Digital Media....Legally
MediaPost
 
DEEPTRUST - Dragens Den presentation
DEEPTRUST - Dragens Den presentationDEEPTRUST - Dragens Den presentation
DEEPTRUST - Dragens Den presentation
Abhishek Upadhyay
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
Lilian Edwards
 
On the Political Economy of Big Data: Some Ethical Considerations
On the Political Economy of Big Data: Some Ethical ConsiderationsOn the Political Economy of Big Data: Some Ethical Considerations
On the Political Economy of Big Data: Some Ethical Considerations
David Bieri
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
Home
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012
lilianedwards
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)Adam Thierer
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and West
Lilian Edwards
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
TechSoup Canada
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
caniceconsulting
 
SFScon 22 - Paolo Pinto - Real Life Data Anonymization.pdf
SFScon 22 - Paolo Pinto - Real Life Data Anonymization.pdfSFScon 22 - Paolo Pinto - Real Life Data Anonymization.pdf
SFScon 22 - Paolo Pinto - Real Life Data Anonymization.pdf
South Tyrol Free Software Conference
 

Similar to Big data privacy security regulation (20)

Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Big Data - Marketing Gone Mad?
Big Data - Marketing Gone Mad?Big Data - Marketing Gone Mad?
Big Data - Marketing Gone Mad?
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big data
 
The Future of Big Data
The Future of Big Data The Future of Big Data
The Future of Big Data
 
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
June 2015 (142)  MIS Quarterly Executive   67The Big Dat.docxJune 2015 (142)  MIS Quarterly Executive   67The Big Dat.docx
June 2015 (142) MIS Quarterly Executive 67The Big Dat.docx
 
The 3 Secrets of Online Privacy
The 3 Secrets of Online Privacy The 3 Secrets of Online Privacy
The 3 Secrets of Online Privacy
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 
Maximizing & Exploiting Big Data in Digital Media....Legally
Maximizing & Exploiting Big Data in Digital Media....LegallyMaximizing & Exploiting Big Data in Digital Media....Legally
Maximizing & Exploiting Big Data in Digital Media....Legally
 
DEEPTRUST - Dragens Den presentation
DEEPTRUST - Dragens Den presentationDEEPTRUST - Dragens Den presentation
DEEPTRUST - Dragens Den presentation
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
On the Political Economy of Big Data: Some Ethical Considerations
On the Political Economy of Big Data: Some Ethical ConsiderationsOn the Political Economy of Big Data: Some Ethical Considerations
On the Political Economy of Big Data: Some Ethical Considerations
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Draft data protection regn 2012
Draft data protection regn 2012Draft data protection regn 2012
Draft data protection regn 2012
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and West
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
SFScon 22 - Paolo Pinto - Real Life Data Anonymization.pdf
SFScon 22 - Paolo Pinto - Real Life Data Anonymization.pdfSFScon 22 - Paolo Pinto - Real Life Data Anonymization.pdf
SFScon 22 - Paolo Pinto - Real Life Data Anonymization.pdf
 

Recently uploaded

Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdfUnleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Enterprise Wired
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
u86oixdj
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
slg6lamcq
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
Roger Valdez
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
u86oixdj
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
v3tuleee
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
manishkhaire30
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
dwreak4tg
 
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
GetInData
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
balafet
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
Nanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdfNanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdf
eddie19851
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
ahzuo
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
mbawufebxi
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
oz8q3jxlp
 

Recently uploaded (20)

Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdfUnleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
 
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
Nanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdfNanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdf
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
 

Big data privacy security regulation

  • 1. BIG DATA Big Data Overview: Security, Privacy, Regulation Charles Walker April 16, 2014
  • 2. BIG DATA Potential Big Data Implications • Conventional Wisdom on Big Data: – Data should only be collected for an identified purpose • First Commandment of Data Hygiene – “Thou shall not collect and hold onto personal information unnecessary to an identified purpose.” – FTC Chairman Edith Ramirez, 2012
  • 3. BIG DATA Potential Big Data Implications • Conventional Wisdom on Big Data: – Data should only be collected for an identified purpose • First Commandment of Data Hygiene – “Thou shall not collect and hold onto personal information unnecessary to an identified purpose.” – FTC Chairman Edith Ramirez, 2012 • Another View of Big Data: – “. . . big data refers to things one can do at a large scale that cannot be done at a smaller one, to extract new insights or create new forms of value, in ways that change markets, organizations, the relationship between citizens and governments, and more.” Viktor Mayer-Schönberger and Kenneth Cukier, “Big Data: a revolution that will transform how we live, work and think”, Houghton Mifflin Harcourt, 2013
  • 4. BIG DATA Potential Big Data Implications • Conventional Wisdom on Big Data: – Data should only be collected for an identified purpose • First Commandment of Data Hygiene – “Thou shall not collect and hold onto personal information unnecessary to an identified purpose.” – FTC Chairman Edith Ramirez, 2012 • Another View of Big Data: – “. . . big data refers to things one can do at a large scale that cannot be done at a smaller one, to extract new insights or create new forms of value, in ways that change markets, organizations, the relationship between citizens and governments, and more.” Viktor Mayer-Schönberger and Kenneth Cukier, “Big Data: a revolution that will transform how we live, work and think”, Houghton Mifflin Harcourt, 2013 • Benefits From Big Data Innovations: – “Because big data analysis involves finding correlations and patterns that might otherwise not be observable, it almost necessarily involves uses of data that were not anticipated at the time the data were collected.” Thomas M. Lenard and Paul H. Rubin, Technology Policy Institute: The Big Data Revolution: Privacy Considerations, Technology Policy Institute, December 2013
  • 5. BIG DATA Identity Theft and Big Data? • Big Data is thought to present risks for increased identity theft: – Data Brokers Vulnerable to Black Market Identity Thieves: http://bit.ly/1emd51h
  • 6. BIG DATA Identity Theft and Big Data? • Big Data is thought to present risks for increased identity theft: – Data Brokers Vulnerable to Black Market Identity Thieves: http://bit.ly/1emd51h • Overall Identity Theft has Actually Been Flat Since 2005: – Overall incidence of identity fraud has been flat from 2005-2012 – Total $ lost to fraud fell from $29.1B ’05 – ’09 to $19.6B ‘10 –’12 – Only 15% of identity fraud is associated with data breaches/online causes Thomas M. Lenard and Paul H. Rubin, Technology Policy Institute: The Big Data Revolution:Privacy Considerations, Technology Policy Institute, December 2013
  • 7. BIG DATA Identity Theft and Big Data? • Big Data is thought to present risks for increased identity theft: – Data Brokers Vulnerable to Black Market Identity Thieves: http://bit.ly/1emd51h • Overall Identity Theft has Actually Been Flat Since 2005: – Overall incidence of identity fraud has been flat from 2005-2012 – Total $ lost to fraud fell from $29.1B ’05 – ’09 to $19.6B ‘10 –’12 – Only 15% of identity fraud is associated with data breaches/online causes Thomas M. Lenard and Paul H. Rubin, Technology Policy Institute: The Big Data Revolution:Privacy Considerations, Technology Policy Institute, December 2013 • Big Data Solutions Can Combat Identity Theft – States Turn To Big Data Solution to Combat Tax Fraud: http://bit.ly/OFBx17 – IBM Using Big Data Solutions to Fight Big Business Fraud: http://bit.ly/OFvh9J
  • 8. BIG DATA Regulatory Challenges • EU poised for sweeping changes in data protection for member states – Draft of proposed law “ . . . based on the proposition that control of individual, personal data is a fundamental human right, and includes the right to consent, the right to access, and the ‘right to be forgotten,’ within limits.” – Companies that violate laws regarding EU member data could face up to $136 M in fines Big regulation poised to change big data - http://bit.ly/1l4I7ZS
  • 9. BIG DATA Regulatory Challenges • EU poised for sweeping changes in data protection for member states – Draft of proposed law “ . . . based on the proposition that control of individual, personal data is a fundamental human right, and includes the right to consent, the right to access, and the ‘right to be forgotten,’ within limits.” – Companies that violate laws regarding EU member data could face up to $136 M in fines Big regulation poised to change big data - http://bit.ly/1l4I7ZS • US Policy Review on Data Collection Underway – Edward Snowden’s leaks on NSA data collection have prompted reform on how metadata is collected and accessed by intelligence agencies. http://bit.ly/1kvmAei – WH Adviser John Podesta challenges private industry on transparency: http://on.wsj.com/Qdus9C – Tech Giants Battle WH framing of data mining: http://bit.ly/1hH5c5U