SlideShare a Scribd company logo
©https://www.google.com/
If Mary had a little lamb, who
should know about it?
- Data Ownership & Privacy -
@thisisgerard
gerard.sylvester@fao.org
Gerard Sylvester
Regional Knowledge Management Officer
A more connected future
3D food printing
Connected Cow
Drones & GIS
Source: ITU
©www.ibm.com
“..data has intrinsic value as well as having
added value as a byproduct of information
processing, at the core, the degree of
ownership (and by corollary, the degree of
responsibility) is driven by the value that each
interested party derives from the use of that
information” – Loshin (2002)
Data Protection Laws of the World:
https://www.dlapiperdataprotection.com/system/modules/za.co.heliosdesign.dla.lotw.data_protection/functions/
handbook.pdf?country=all
Also read, ASEAN Framework on Personal Data Protection
• Creator – The party that creates or generate data
• Consumer – The party that uses the data owns the data
• Compiler - This is the entity that selects and compiles information from different information
sources
• Enterprise - All data that enters the enterprise or is created within the enterprise is completely
owned by the enterprise
• Funder - the user that commissions the data creation claims ownership
• Decoder - In environments where information is “locked” inside particular encoded formats, the
party that can unlock the information becomes an owner of that information
• Packager - the party that collects information for a particular use and adds value through
formatting the information for a particular market or set of consumers
• Reader as owner - the value of any data that can be read is subsumed by the reader and,
therefore, the reader gains value through adding that information to an information repository
• Subject as owner - the subject of the data claims ownership of that data, mostly in reaction to
another party claiming ownership of the same data
• Purchaser/Licenser as Owner – the individual or organization that buys or licenses data may
stake a claim to ownership
Data Ownership – Paradigm of ownership
• Lawfulness, fairness and transparency
• Purpose limitation
• Data Minimisation
• Accuracy
• Storage Limitation
• Integrity and Confidentiality
• the principle of accountability
Six Data Protection Principles
According to Article 5(1) GDPR
According to Article 5(2) GDPR
THANK YOU
@thisisgerard
gerard.sylvester@fao.org
Gerard Sylvester
Regional Knowledge Management Officer

More Related Content

What's hot

Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
Sreejith Nair
 
Data science unit1
Data science unit1Data science unit1
Data science unit1
varshakumar21
 
Data encryption in database management system
Data encryption in database management systemData encryption in database management system
Data encryption in database management system
Rabin BK
 
Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 
Big data
Big dataBig data
Big data ppt
Big data pptBig data ppt
Big data ppt
Deepika ParthaSarathy
 
DATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MININGDATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MINING
Lovely Professional University
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
Home
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
grahamwell
 
The database applications
The database applicationsThe database applications
The database applications
Dolat Ram
 
Privacy preserving dm_ppt
Privacy preserving dm_pptPrivacy preserving dm_ppt
Privacy preserving dm_ppt
Sagar Verma
 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousing
Kamal Acharya
 
Multimedia Database
Multimedia Database Multimedia Database
Multimedia Database
Avnish Patel
 
Database security
Database securityDatabase security
Database security
MaryamAsghar9
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrity
Pooja Dixit
 
Database architecture
Database architectureDatabase architecture
Database architecture
VENNILAV6
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
mrmwood
 
Information Security and Privacy
Information Security and PrivacyInformation Security and Privacy
Information Security and PrivacyAnika Tasnim Hafiz
 

What's hot (20)

Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 
Data science unit1
Data science unit1Data science unit1
Data science unit1
 
Data encryption in database management system
Data encryption in database management systemData encryption in database management system
Data encryption in database management system
 
Web Security
Web SecurityWeb Security
Web Security
 
Big data
Big dataBig data
Big data
 
Big data ppt
Big data pptBig data ppt
Big data ppt
 
DATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MININGDATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MINING
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
The database applications
The database applicationsThe database applications
The database applications
 
Ppt
PptPpt
Ppt
 
Privacy preserving dm_ppt
Privacy preserving dm_pptPrivacy preserving dm_ppt
Privacy preserving dm_ppt
 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousing
 
Multimedia Database
Multimedia Database Multimedia Database
Multimedia Database
 
Big data
Big dataBig data
Big data
 
Database security
Database securityDatabase security
Database security
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrity
 
Database architecture
Database architectureDatabase architecture
Database architecture
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Information Security and Privacy
Information Security and PrivacyInformation Security and Privacy
Information Security and Privacy
 

Similar to Data Ownership and Privacy

Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Alan McSweeney
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless World
Qualys
 
Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)
Jean-Michel Franco
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction Brief
Nováccent
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
robkitchin
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
Kellyn Pot'Vin-Gorman
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
VMUG IT
 
GDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage AnalyticsGDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage Analytics
Revulytics Inc.
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
xband
 
Leveraging knowledgelevers
Leveraging knowledgeleversLeveraging knowledgelevers
Leveraging knowledgelevers
Knowledgelevers
 
Secuntialesse
SecuntialesseSecuntialesse
Secuntialesse
Anne Starr
 
Hadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business UnitHadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business UnitDataWorks Summit
 
gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3
Anne Starr
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod
Garet Keller
 
Cybertopicsecurity_3
Cybertopicsecurity_3Cybertopicsecurity_3
Cybertopicsecurity_3
Anne Starr
 
Ib3514141422
Ib3514141422Ib3514141422
Ib3514141422
IJERA Editor
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
IBM Security
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
Tom Walker
 
GDPR Data Lifecycle
GDPR Data LifecycleGDPR Data Lifecycle
GDPR Data Lifecycle
Jatin Kochhar
 

Similar to Data Ownership and Privacy (20)

Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless World
 
Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction Brief
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
GDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage AnalyticsGDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage Analytics
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
Leveraging knowledgelevers
Leveraging knowledgeleversLeveraging knowledgelevers
Leveraging knowledgelevers
 
Secuntialesse
SecuntialesseSecuntialesse
Secuntialesse
 
Hadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business UnitHadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business Unit
 
gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod
 
Cybertopicsecurity_3
Cybertopicsecurity_3Cybertopicsecurity_3
Cybertopicsecurity_3
 
Ib3514141422
Ib3514141422Ib3514141422
Ib3514141422
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
GDPR Data Lifecycle
GDPR Data LifecycleGDPR Data Lifecycle
GDPR Data Lifecycle
 
Gdpr brief and controls ver2.0
Gdpr brief and controls ver2.0Gdpr brief and controls ver2.0
Gdpr brief and controls ver2.0
 

More from Gerard Sylvester

Digital Technologies to Improve Value Chain Efficiency
Digital Technologies to Improve Value Chain EfficiencyDigital Technologies to Improve Value Chain Efficiency
Digital Technologies to Improve Value Chain Efficiency
Gerard Sylvester
 
Digitalization to transform African Agriculture
Digitalization to transform African AgricultureDigitalization to transform African Agriculture
Digitalization to transform African Agriculture
Gerard Sylvester
 
Digital Agriculture: Trends and Challenges
Digital Agriculture: Trends and ChallengesDigital Agriculture: Trends and Challenges
Digital Agriculture: Trends and Challenges
Gerard Sylvester
 
E-agriculture Trends and Challenges
E-agriculture Trends and ChallengesE-agriculture Trends and Challenges
E-agriculture Trends and Challenges
Gerard Sylvester
 
Synthesis from the forum on ICT and Agriculture in the Context of Green Growth
Synthesis from the forum on ICT and Agriculture in the Context of Green GrowthSynthesis from the forum on ICT and Agriculture in the Context of Green Growth
Synthesis from the forum on ICT and Agriculture in the Context of Green Growth
Gerard Sylvester
 
The World Cafe
The World CafeThe World Cafe
The World Cafe
Gerard Sylvester
 
CIARD
CIARDCIARD
CIARD
CIARDCIARD
PhilAgriNet
PhilAgriNetPhilAgriNet
PhilAgriNet
Gerard Sylvester
 
D Space Installation
D Space InstallationD Space Installation
D Space Installation
Gerard Sylvester
 
Reusable Learning Objects
Reusable Learning ObjectsReusable Learning Objects
Reusable Learning Objects
Gerard Sylvester
 
Google Hacking
Google HackingGoogle Hacking
Google Hacking
Gerard Sylvester
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Gerard Sylvester
 
Presentation at Witfor 2009
Presentation at Witfor 2009Presentation at Witfor 2009
Presentation at Witfor 2009
Gerard Sylvester
 
Effective Google Searches
Effective Google SearchesEffective Google Searches
Effective Google Searches
Gerard Sylvester
 
Semantic Web Tools For Agricultural Materials
Semantic Web Tools For Agricultural MaterialsSemantic Web Tools For Agricultural Materials
Semantic Web Tools For Agricultural Materials
Gerard Sylvester
 
Webservices
WebservicesWebservices
Webservices
Gerard Sylvester
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
Gerard Sylvester
 

More from Gerard Sylvester (20)

Digital Technologies to Improve Value Chain Efficiency
Digital Technologies to Improve Value Chain EfficiencyDigital Technologies to Improve Value Chain Efficiency
Digital Technologies to Improve Value Chain Efficiency
 
Digitalization to transform African Agriculture
Digitalization to transform African AgricultureDigitalization to transform African Agriculture
Digitalization to transform African Agriculture
 
Digital Agriculture: Trends and Challenges
Digital Agriculture: Trends and ChallengesDigital Agriculture: Trends and Challenges
Digital Agriculture: Trends and Challenges
 
E-agriculture Trends and Challenges
E-agriculture Trends and ChallengesE-agriculture Trends and Challenges
E-agriculture Trends and Challenges
 
Synthesis from the forum on ICT and Agriculture in the Context of Green Growth
Synthesis from the forum on ICT and Agriculture in the Context of Green GrowthSynthesis from the forum on ICT and Agriculture in the Context of Green Growth
Synthesis from the forum on ICT and Agriculture in the Context of Green Growth
 
The World Cafe
The World CafeThe World Cafe
The World Cafe
 
Web 2.0 & Social Media
Web 2.0 & Social MediaWeb 2.0 & Social Media
Web 2.0 & Social Media
 
CIARD
CIARDCIARD
CIARD
 
CIARD
CIARDCIARD
CIARD
 
e-Agriculture
e-Agriculturee-Agriculture
e-Agriculture
 
PhilAgriNet
PhilAgriNetPhilAgriNet
PhilAgriNet
 
D Space Installation
D Space InstallationD Space Installation
D Space Installation
 
Reusable Learning Objects
Reusable Learning ObjectsReusable Learning Objects
Reusable Learning Objects
 
Google Hacking
Google HackingGoogle Hacking
Google Hacking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Presentation at Witfor 2009
Presentation at Witfor 2009Presentation at Witfor 2009
Presentation at Witfor 2009
 
Effective Google Searches
Effective Google SearchesEffective Google Searches
Effective Google Searches
 
Semantic Web Tools For Agricultural Materials
Semantic Web Tools For Agricultural MaterialsSemantic Web Tools For Agricultural Materials
Semantic Web Tools For Agricultural Materials
 
Webservices
WebservicesWebservices
Webservices
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Data Ownership and Privacy

  • 1. ©https://www.google.com/ If Mary had a little lamb, who should know about it? - Data Ownership & Privacy - @thisisgerard gerard.sylvester@fao.org Gerard Sylvester Regional Knowledge Management Officer
  • 2. A more connected future 3D food printing Connected Cow Drones & GIS Source: ITU
  • 3. ©www.ibm.com “..data has intrinsic value as well as having added value as a byproduct of information processing, at the core, the degree of ownership (and by corollary, the degree of responsibility) is driven by the value that each interested party derives from the use of that information” – Loshin (2002) Data Protection Laws of the World: https://www.dlapiperdataprotection.com/system/modules/za.co.heliosdesign.dla.lotw.data_protection/functions/ handbook.pdf?country=all Also read, ASEAN Framework on Personal Data Protection
  • 4. • Creator – The party that creates or generate data • Consumer – The party that uses the data owns the data • Compiler - This is the entity that selects and compiles information from different information sources • Enterprise - All data that enters the enterprise or is created within the enterprise is completely owned by the enterprise • Funder - the user that commissions the data creation claims ownership • Decoder - In environments where information is “locked” inside particular encoded formats, the party that can unlock the information becomes an owner of that information • Packager - the party that collects information for a particular use and adds value through formatting the information for a particular market or set of consumers • Reader as owner - the value of any data that can be read is subsumed by the reader and, therefore, the reader gains value through adding that information to an information repository • Subject as owner - the subject of the data claims ownership of that data, mostly in reaction to another party claiming ownership of the same data • Purchaser/Licenser as Owner – the individual or organization that buys or licenses data may stake a claim to ownership Data Ownership – Paradigm of ownership
  • 5. • Lawfulness, fairness and transparency • Purpose limitation • Data Minimisation • Accuracy • Storage Limitation • Integrity and Confidentiality • the principle of accountability Six Data Protection Principles According to Article 5(1) GDPR According to Article 5(2) GDPR