The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
Upon completion of this module you will:
- Be able to recognize the necessity of regulating big data
- Understand the difference between privacy and data protection
- Know how to implement actions of data protection into your own (future) company
Duration of the module: approximately 1 – 2 hours
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
Upon completion of this module you will:
- Be able to recognize the necessity of regulating big data
- Understand the difference between privacy and data protection
- Know how to implement actions of data protection into your own (future) company
Duration of the module: approximately 1 – 2 hours
CBSE open book exam plan evokes mixed reactions.
Students will be forced to think beyond narrow definitions of what they learn from books, making learning more experiential.
Rote learning a closed chapter, CBSE to begin open book era.
Teachers brace for open book challenge.
Open Book Exam System by CBSE
Sometime back there was a news that CBSE is planning to introduce Open Book Exam system for the current session "CBSE is all set to introduce the “OPEN BOOK EXAM “ for classes IX, X, XI in 2013 -2014 session and in Class XII from next academic session, reports some section of the media"
The Video and the Post here explains what exactly is an Open Book Exam
Some Facts about the Open Book Exam System
Open book tests are not easy tests.
Open book tests teach you how to find information when you need it.
The questions are designed to teach you how to use your brain
The CBSE open book system will be for 15-20% of the marks. The schools will be supplied with the text material in few months before the commencement of Summative Assessment – 2. (It will start from 2014).
Due to the evolution of personalized, data-driven digital marketing, companies now have infinite amounts of personally identifiable information (PII) about their customers; and this stockpile of information continues to grow—at an exponential rate. In fact, according to the Pew Research Center, the volume of business data worldwide—across all industries—doubles every 1.2 years.
But how should you use this treasure trove of data? And at what point does the information known about your consumers—and the ways you use this information—risk consumer privacy? Is there such thing as too much data?
Attend this webinar to learn:
• What your responsibilities are in today’s ‘big data universe’
• How to use your data and meet compliance laws
• Tips for integrating data across channels and platforms
• How to implement the principles of ‘Privacy by Design’
Ethics of Big Data is about finding alignment between an organization's core values and their day-to-day actions in a way that balances risk and innovation. As Big Data brings business operations and practices deeper and more fully into individual lives, it is creating a forcing function that raises ethical questions about our values around concepts like identity, privacy, ownership, and reputation. How we understand those values and align them with our actions when innovating products and services using Big Data technologies benefits from a framework that provides a common vocabulary and encourages explicit discussion.
The material will address the intersection of ethics and Big Data; what it is and what it isn't. Specifically, how to approach and generate dialog about an abstract subject with direct, real-world implications. A general framework for talking about ethics in the context of Big Data will be introduced.
Aspects include:
1. Direct relevance to your data handling practices
2. How Big Data is influencing important concepts including identity, privacy, ownership, and reputation
3. Ethical Decision Points
4. Value Personas as a tool for encouraging discussion and generating agreement and alignment between values and actions
5. Balancing the benefits of Big Data innovation and the risks of harm
The webcast will present key concepts from the forthcoming book Ethics of Big Data
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
Today, balancing business opportunity and customer's data protection has become a difficult challenge. As technology, data sources and targeting abilities grow, so does the crucial need to respect user privacy and ensure a good data protection. But with laws, practices and definitions that are constantly evolving around the world, it can all seem a bit confusing.
Not sure where to start? Wondering how you can better align with privacy law? Then this webinar is for you.
An introduction to the topic of ethics and big data ending with questions about how to teach data journalists. Part of the Berkman Center for Internet & Society's Study group "Teaching Data Storytelling for Civic Impact".
Data and Ethics: Why Data Science Needs OneTim Rich
This was a talk I gave at SXSW 2016. It outlines the current state of applied ethics in data science as a profession. Describes key reasons a code should be constructed and also proposes a framework to begin discussion.
Privacy 2020 (Participants) EINS summer schooli_scienceEU
Network of Excellence Internet Science Summer School. The theme of the summer school is "Internet Privacy and Identity, Trust and Reputation Mechanisms".
More information: http://www.internet-science.eu/
Authors:
Tulio de Souza
Kinfemicheal Yilma Desta
Maria Lambrou
Wonjae Lee
Gaia Leli
Kai Samelin
Jat Singh
If we don’t balance the human values that we care about with the compelling uses of big data, our society risks abandoning them for the sake of mere innovation or expediency.
Ben Torres/Bloomberg via Getty Images
These days, everyone seems to be talking about “big data.” Engineers, researchers, lawyers, executives and self-trackers all tout the surprising insights they can get from applying math to large data sets. The rhetoric of big data is often overblown, exaggerated and contradictory, but there’s an element of truth to the claim that data science is helping us to know more about our world, our society and ourselves.
Data scientists use big data to deliver personalized ads to Internet users, to make better spell checkers and search engines, to predict weather patterns, perform medical research, learn about customers, set prices and plan traffic flow patterns. Big data can also fight crime, whether through the use of automated license-plate readers or, at least theoretically, through the collection of vast amounts of “metadata” about our communications and associations by the National Security Agency.
Sogeti big data research privacy technology and the lawYann SESE
Privacy, technology and the law
Big Data for everyone through good design
The same tools that drive organizations towards data driven business and could have a high impact on marketing, process optimizing and maybe even predicting the future of products with predictive analytics, also raise real concerns about new privacy intrusive technological possibilities such as re-identification, ubiquitous monitoring and thorough risk analyses on an individual level.
Organisations and their customers need to find a healthy balance that suits both parties. In this report VINT presents Privacy by Design, Privacy-Enhancing Technologies and legislation as the winning strategy to make Big Data efforts profitable without harming the trust of customers.
http://www.ict-books.com/books/inspiration-trends
CBSE open book exam plan evokes mixed reactions.
Students will be forced to think beyond narrow definitions of what they learn from books, making learning more experiential.
Rote learning a closed chapter, CBSE to begin open book era.
Teachers brace for open book challenge.
Open Book Exam System by CBSE
Sometime back there was a news that CBSE is planning to introduce Open Book Exam system for the current session "CBSE is all set to introduce the “OPEN BOOK EXAM “ for classes IX, X, XI in 2013 -2014 session and in Class XII from next academic session, reports some section of the media"
The Video and the Post here explains what exactly is an Open Book Exam
Some Facts about the Open Book Exam System
Open book tests are not easy tests.
Open book tests teach you how to find information when you need it.
The questions are designed to teach you how to use your brain
The CBSE open book system will be for 15-20% of the marks. The schools will be supplied with the text material in few months before the commencement of Summative Assessment – 2. (It will start from 2014).
Due to the evolution of personalized, data-driven digital marketing, companies now have infinite amounts of personally identifiable information (PII) about their customers; and this stockpile of information continues to grow—at an exponential rate. In fact, according to the Pew Research Center, the volume of business data worldwide—across all industries—doubles every 1.2 years.
But how should you use this treasure trove of data? And at what point does the information known about your consumers—and the ways you use this information—risk consumer privacy? Is there such thing as too much data?
Attend this webinar to learn:
• What your responsibilities are in today’s ‘big data universe’
• How to use your data and meet compliance laws
• Tips for integrating data across channels and platforms
• How to implement the principles of ‘Privacy by Design’
Ethics of Big Data is about finding alignment between an organization's core values and their day-to-day actions in a way that balances risk and innovation. As Big Data brings business operations and practices deeper and more fully into individual lives, it is creating a forcing function that raises ethical questions about our values around concepts like identity, privacy, ownership, and reputation. How we understand those values and align them with our actions when innovating products and services using Big Data technologies benefits from a framework that provides a common vocabulary and encourages explicit discussion.
The material will address the intersection of ethics and Big Data; what it is and what it isn't. Specifically, how to approach and generate dialog about an abstract subject with direct, real-world implications. A general framework for talking about ethics in the context of Big Data will be introduced.
Aspects include:
1. Direct relevance to your data handling practices
2. How Big Data is influencing important concepts including identity, privacy, ownership, and reputation
3. Ethical Decision Points
4. Value Personas as a tool for encouraging discussion and generating agreement and alignment between values and actions
5. Balancing the benefits of Big Data innovation and the risks of harm
The webcast will present key concepts from the forthcoming book Ethics of Big Data
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
Today, balancing business opportunity and customer's data protection has become a difficult challenge. As technology, data sources and targeting abilities grow, so does the crucial need to respect user privacy and ensure a good data protection. But with laws, practices and definitions that are constantly evolving around the world, it can all seem a bit confusing.
Not sure where to start? Wondering how you can better align with privacy law? Then this webinar is for you.
An introduction to the topic of ethics and big data ending with questions about how to teach data journalists. Part of the Berkman Center for Internet & Society's Study group "Teaching Data Storytelling for Civic Impact".
Data and Ethics: Why Data Science Needs OneTim Rich
This was a talk I gave at SXSW 2016. It outlines the current state of applied ethics in data science as a profession. Describes key reasons a code should be constructed and also proposes a framework to begin discussion.
Privacy 2020 (Participants) EINS summer schooli_scienceEU
Network of Excellence Internet Science Summer School. The theme of the summer school is "Internet Privacy and Identity, Trust and Reputation Mechanisms".
More information: http://www.internet-science.eu/
Authors:
Tulio de Souza
Kinfemicheal Yilma Desta
Maria Lambrou
Wonjae Lee
Gaia Leli
Kai Samelin
Jat Singh
If we don’t balance the human values that we care about with the compelling uses of big data, our society risks abandoning them for the sake of mere innovation or expediency.
Ben Torres/Bloomberg via Getty Images
These days, everyone seems to be talking about “big data.” Engineers, researchers, lawyers, executives and self-trackers all tout the surprising insights they can get from applying math to large data sets. The rhetoric of big data is often overblown, exaggerated and contradictory, but there’s an element of truth to the claim that data science is helping us to know more about our world, our society and ourselves.
Data scientists use big data to deliver personalized ads to Internet users, to make better spell checkers and search engines, to predict weather patterns, perform medical research, learn about customers, set prices and plan traffic flow patterns. Big data can also fight crime, whether through the use of automated license-plate readers or, at least theoretically, through the collection of vast amounts of “metadata” about our communications and associations by the National Security Agency.
Sogeti big data research privacy technology and the lawYann SESE
Privacy, technology and the law
Big Data for everyone through good design
The same tools that drive organizations towards data driven business and could have a high impact on marketing, process optimizing and maybe even predicting the future of products with predictive analytics, also raise real concerns about new privacy intrusive technological possibilities such as re-identification, ubiquitous monitoring and thorough risk analyses on an individual level.
Organisations and their customers need to find a healthy balance that suits both parties. In this report VINT presents Privacy by Design, Privacy-Enhancing Technologies and legislation as the winning strategy to make Big Data efforts profitable without harming the trust of customers.
http://www.ict-books.com/books/inspiration-trends
over the past ten years, data has grown on the Internet, and we are the fuel and haste of this increase. Business owners, they produce apps for us, and we feed these companies with our data, unfortunately, it is all our private data. In the end, we become, through our private data, a commodity that is sold to the highest bidder.
Without security, not even privacy. Ethical oversight and constraints are needed to ensure that an appropriate balance. This article will cover: the contents of big data, what it includes, how data is collected, and the process of involving it on the Internet. In addition, it discuss the analysis of data, methods of collecting it, and factors of ethical challenges. Furthermore, the user's rights, which must be observed, and the privacy the user has.
My Data - A Nordic Model for human-centered personal data management and proc...Joonas Pekkanen
This white paper - written by Open Knowledge Finland and published by the Ministry of Transportation and Communication of Finland - presents a framework, principles, and a model for a human-centric approach to the managing and processing of personal information. The approach – defined as MyData – is based on the right of individuals to access the data collected about them. The core idea is that individuals should be in control of their own data. The MyData approach aims at strengthening digital human rights while opening new opportunities for businesses to develop innovative personal data based services built on mutual trust.
El objetivo de este modulo es ofrecer una vision general sobre el impacto futuro del Big Data.
Una vez completado este modulo, podrá:
Obtener una valiosa información de las predicciones para el futuro del Big Data
Conseguir un mayor conocimiento que permita reconocer algunas de las tendencias que están surgiendo
Adquirir una vision general de las oportunidades que pueden beneficiar a su negocio con el Big Data
Comprender algunos de los desafíos iniciales que podrías tener con el Big Data
El objetivo de este módulo es proporcionar una visión general de la ética que rodea al Big Data y la legislación que rige.
Una vez completado este módulo, podrá:
- Adquirir conocimientos sobre cómo reconocer la necesidad de regular el Big Data
- Identificar la diferencia entre privacidad y protección de datos
- Comprender la necesidad de implementar acciones de protección de datos en su propio negocio
El objetivo de este módulo es obtener una visión general sobre cómo utilizar los datos externos para mejorar el negocio.
Una vez completado este módulo, podrá:
Comprender los fundamentos de los datos externos y dónde encontrarlos
Comprender que ya existe una gran cantidad de datos abiertos que pueden ser utilizados
Reconocer los beneficios de utilizar datos externos para mejorar el negocio
El objetivo de este módulo es obtener una visión general sobre cómo utilizar los datos de los que ya se dispone para mejorar el negocio.
Una vez completado este módulo, podrá:
Comprender cómo aprovechar los datos existentes que ya tiene
Conocer la ubicación de los datos internos que ya se encuentran en su empresa
Mejorar su conocimiento sobre cómo los datos pueden ayudar a desarrollar su marca
El objetivo de este módulo es proporcionar una visión general sobre lo que entendemos por Big Data.
Una vez completado este módulo, podrá:
- Comprender el papel emergente del Big Data
- Entender los términos clave del Big Data y Smart Data
- Saber cómo Big Data puede convertirse en Smart Data
- Ser capaz de aplicar los términos clave en relación con el Big Data
Dwe m4 cyber bullying and conflict resolutionData-Set
You will understand the difference between online and offline cyberbullying and digital drama
You will learn how cyberbullying can occur in education and what a cyberbullying educational policy should include
You will learn the different types of cyberbullying and how to react to cyberbullying and negativity online
You will be able to address countering hate speech online
Dwe m3 digital footprint netiquette and reputation Data-Set
You will learn what your digital footprint is and how you can leave traces that can never be erased
You will be able to find out the size of your digital footprint by using different tools such as the Personal Digital Footprint Calculator
You will also become aware of your digital shadow and what it comprises of
You will check out your netiquette and see if it is correct or acceptable when using the internet
You will understand your online reputation and, by incorporating the 4 tips, be able to protect it
Learning Objective
You will learn the difference between online an offline identities. You will learn whether authenticity or anonymity is more important
You will understand different personas and how it can be presented or perceived by others
You will learn about the difference between real self vs online self
You will know why it is important and how to be your true self online
Learning objectives
You will learn how to look after your personal health, safety, relationships and work-life balance in a digital setting
You will know how to be digitally responsible in a way that doesn’t harm others
You will understand the impacts of social media on your psychological wellbeing and what you can do
You will learn how digital technology impacts your physical health
You will become aware of how digital knowledge is a poor substitute for learning in the real world
The objective of this module is to provide an overview of the basic information on big data.
Upon completion of this module you will:
-Comprehend the emerging role of big data
-Understand the key terms regarding big and smart data
-Know how big data can be turned into smart data
-Be able to apply the key terms regarding big data
The objective of this module is to gain an overview of how to use the data you already have available in order to improve your business.
Upon completion of this module you will:
Gain an understanding of how to take advantage of the existing data you already have
Comprehend the location of where internal data already lies within your company
Improve your knowledge on how data can help build your brand
The objective of this module is to provide an overview of what the future impacts of big data are likely to be.
Upon completion of this module you will:
Gain valuable insight into the predictions for the future of Big Data
Be better placed to recognise some of the trends that are emerging
Acquire an overview of the possible opportunities your business can have with Big Data
Understand some of the start up challenges you might have with Big Data
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
Data set Improve your business with your own business dataData-Set
The objective of this module is to gain an overview of how to use the data you already have available in order to improve your business.
Upon completion of this module you will:
-Gain an understanding of how to take advantage of the existing data you already have
-Comprehend the location of where internal data already lies within your company
-Improve your knowledge on how data can help build your brand
The objective of this module is to provide an overview of the basic information on big data.
Upon completion of this module you will:
-Comprehend the emerging role of big data
-Understand the key terms regarding big and smart data
-Know how big data can be turned into smart data
-Be able to apply the key terms regarding big data
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
Explore our comprehensive data analysis project presentation on predicting product ad campaign performance. Learn how data-driven insights can optimize your marketing strategies and enhance campaign effectiveness. Perfect for professionals and students looking to understand the power of data analysis in advertising. for more details visit: https://bostoninstituteofanalytics.org/data-science-and-artificial-intelligence/
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...pchutichetpong
M Capital Group (“MCG”) expects to see demand and the changing evolution of supply, facilitated through institutional investment rotation out of offices and into work from home (“WFH”), while the ever-expanding need for data storage as global internet usage expands, with experts predicting 5.3 billion users by 2023. These market factors will be underpinned by technological changes, such as progressing cloud services and edge sites, allowing the industry to see strong expected annual growth of 13% over the next 4 years.
Whilst competitive headwinds remain, represented through the recent second bankruptcy filing of Sungard, which blames “COVID-19 and other macroeconomic trends including delayed customer spending decisions, insourcing and reductions in IT spending, energy inflation and reduction in demand for certain services”, the industry has seen key adjustments, where MCG believes that engineering cost management and technological innovation will be paramount to success.
MCG reports that the more favorable market conditions expected over the next few years, helped by the winding down of pandemic restrictions and a hybrid working environment will be driving market momentum forward. The continuous injection of capital by alternative investment firms, as well as the growing infrastructural investment from cloud service providers and social media companies, whose revenues are expected to grow over 3.6x larger by value in 2026, will likely help propel center provision and innovation. These factors paint a promising picture for the industry players that offset rising input costs and adapt to new technologies.
According to M Capital Group: “Specifically, the long-term cost-saving opportunities available from the rise of remote managing will likely aid value growth for the industry. Through margin optimization and further availability of capital for reinvestment, strong players will maintain their competitive foothold, while weaker players exit the market to balance supply and demand.”
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Subhajit Sahu
Abstract — Levelwise PageRank is an alternative method of PageRank computation which decomposes the input graph into a directed acyclic block-graph of strongly connected components, and processes them in topological order, one level at a time. This enables calculation for ranks in a distributed fashion without per-iteration communication, unlike the standard method where all vertices are processed in each iteration. It however comes with a precondition of the absence of dead ends in the input graph. Here, the native non-distributed performance of Levelwise PageRank was compared against Monolithic PageRank on a CPU as well as a GPU. To ensure a fair comparison, Monolithic PageRank was also performed on a graph where vertices were split by components. Results indicate that Levelwise PageRank is about as fast as Monolithic PageRank on the CPU, but quite a bit slower on the GPU. Slowdown on the GPU is likely caused by a large submission of small workloads, and expected to be non-issue when the computation is performed on massive graphs.
Techniques to optimize the pagerank algorithm usually fall in two categories. One is to try reducing the work per iteration, and the other is to try reducing the number of iterations. These goals are often at odds with one another. Skipping computation on vertices which have already converged has the potential to save iteration time. Skipping in-identical vertices, with the same in-links, helps reduce duplicate computations and thus could help reduce iteration time. Road networks often have chains which can be short-circuited before pagerank computation to improve performance. Final ranks of chain nodes can be easily calculated. This could reduce both the iteration time, and the number of iterations. If a graph has no dangling nodes, pagerank of each strongly connected component can be computed in topological order. This could help reduce the iteration time, no. of iterations, and also enable multi-iteration concurrency in pagerank computation. The combination of all of the above methods is the STICD algorithm. [sticd] For dynamic graphs, unchanged components whose ranks are unaffected can be skipped altogether.
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Data set Legislation
1. This programme has been funded with
support from the European Commission
Module 4:
Legislation
2. DATA SET SKILLS FOR BUSINESS
Module 4:
Legislation
The objective of this module is to gain an overview of the ethics
surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big
data
- Obtain an understanding of the difference between privacy and data
protection
- Understand the need to implement data protection actions into your
own business
Duration of the module: approximately 1 – 2 hours
3. DATA SET SKILLS FOR BUSINESS
How about Ethics
Legislation
GDPR
Legal Glossary
1
2
3
4
Ethics of big data
Aspects of big data ethics
Privacy vs Data Protection
Basics of GDPR
Individual Rights
GDPR implementation
4. HOW ABOUT ETHICS?
1. Ethics of Big Data
2. Aspects of Big Data Ethics
DATA SET SKILLS FOR BUSINESS
5. With the increase of computing power,
electronic devices and accessibility to the
Internet, more data than ever is being
produced, collected and transmitted.
Nowadays Big Data is big enough to raise
practical, rather than merely theoretical
concerns about ethics. Big data itself, like
all technology, is ethically neutral.
The use of big data, however, is not.
6. DATA SET SKILLS FOR BUSINESS
ETHICS OF BIG DATA
Collecting and analysing big data has become a powerful way to unlock
actionable insights across any business, but it also brings with it some
concerns about big data ethics that need to be addressed.
Because accessing and storing data is so easy, some organizations
collect everything and keep it forever. It is not just the large
governmental agencies collecting data like this, many major grocery
store chains, investment banks and even the postal services have
a predictive analytics function with the sole purpose of collecting and
analyzing data in order to predict buyer behavior.
QUESTIONS FOR STUDENTS
What if all this data collection takes a negative turn?
“Data can be either
useful or perfectly
anonymous but never
both”
Paul Ohm
7. Aspects Of Big Data Ethics
Big data is already outpacing our ability to understand its
implications. Businesses are innovating every day, and the pace
of big-data growth is practically immeasurable. To provide a
framework for dissecting the often nuanced and interrelated
aspects of big data ethics, the following key components can
help untangle the situation.
Identity Privacy
Ownership Reputation
DATA SET SKILLS FOR BUSINESS
8. AGE FRIENDLY ECONOMY | FUTURE OPPORTUNITIES FOR SMES
“Is online existence identical to offline existence?”
If our historical understanding of what identity means is being
transformed by big-data technologies, then understanding
our values around the concept itself enhances and expands
our ability to determine appropriate and inappropriate
action.
Big data provides others the ability to quite easily summarize,
aggregate, or correlate various aspects of our identity—
without our participation or agreement.
If big data is evolving the meaning of the concept of identity
itself, then big data is also evolving our ethical relationship to
the concept the word represents.
Identity Privacy
Ownership Reputation
DATA SET SKILLS FOR BUSINESS
9. AGE FRIENDLY ECONOMY | FUTURE OPPORTUNITIES FOR SMES
“Who should control access to data about you?”
Plenty of people would argue that we have gained a degree of control over how
the world perceives us e.g. Victims of abuse or people who suffer from the same
disease can share their experiences and gain an invaluable sense of connection and
community through the use of anonymous online identities.
But, have we lost or gained control over our ability to manage how the world
perceives us?
There are two issues.
Why do we expect the ability to self-select and control which facts we share with
the world online to be the same as it is offline? The difference between online and
offline expectations regarding the degree of control individuals have over open
access to data about themselves is a deeply ethical inquiry.
The goal is to understand how to balance the benefits of big-data innovations
with the risks inherent in sharing more information more widely.
• Second, should individuals have a
legitimate ability to control data about
themselves, and to what degree?
• First, does privacy mean the same
thing in both online and offline in the
real world?
Identity Privacy
Ownership Reputation
DATA SET SKILLS FOR BUSINESS
10. AGE FRIENDLY ECONOMY | FUTURE OPPORTUNITIES FOR SMES
Identity Privacy
Ownership Reputation
The degree of ownership we hold over specific information about us
varies as widely as the distinction between privacy rights and privacy
interests.
Does the information about our family history, genetic
makeup, and physical description, preference for Coke or
Pepsi, or ability to shoot free throws on the basketball court
constitute property that we own?
As open data markets grow in size and complexity, open government
data becomes increasingly abundant, and companies generate more
revenue from the use of personal data, the question of who owns
what—and at what point in the data trail—will become a more vocal
debate.
“What does it mean to own data about ourselves?”
DATA SET SKILLS FOR BUSINESS
11. AGE FRIENDLY ECONOMY | FUTURE OPPORTUNITIES FOR SMES
Identity Privacy
Ownership Reputation
One of the biggest changes born from big data is that now the
number of people who can form an opinion about what kind of
person you are is exponentially larger and farther removed
than it was even a few short years ago. And further, your ability
to manage or maintain your online reputation is growing farther
and farther out of individual control. There are entire companies
now whose entire business model is centered on “reputation
management”. We simply don’t know how our historical
understanding of how to manage our reputation translates to
digital behavior.
At a minimum, this is sufficient reason alone to suggest further
inquiry.
“How can we determine what is trustworthy?”
DATA SET SKILLS FOR BUSINESS
12. “Privacy on the
internet? That‘s an
oxymoron”
Catherine Butler
LEGISLATION
1. Privacy vs. Data Protection
DATA SET SKILLS FOR BUSINESS
13. Most users have been unaware of the
volume of personal data retained by
entities for various purposes. This is
beginning to change as awareness of
the data privacy debate is increasing.
The two trends—increasing
popularity of big data and
increasing awareness of data
privacy—are beginning to come to a
head and companies that intend to
capitalize on this era of big data need to
be conscious about and address these
basic ethical concerns.
DATA SET SKILLS FOR BUSINESS
15. PRIVACY DATA
PROTECTION
vs.
Is there any difference?
YES
• Privacy relates to the appropriate use
and control of data
• Data privacy protocols around the world
address the control people have over
their personal data and how they can
protect it from unwanted or harmful
uses
• It covers issues such as: what type of
data will be processed, where will it be
held, how long will it be held for
• Privacy applies whenever the data is:
- Collected
- Processed
- StoredWhich relates to a living individual
person who can be identified by that data.
• Data protection relates to the
confidentiality, availability and
integrity of data
• It focuses on two main areas –
the physical security of premises
and the logical security of data
and digitized information
• It covers issues such as: the
confidentiality, integrity and
availability of data, the
protection of networks, the
physical security of sites,
equipment, transport and
people
DATA SET SKILLS FOR BUSINESS
16. Data privacy, also called
information privacy, is the
aspect of information
technology that deals with
the ability an organization
or individual has to
determine what data in a
computer system can be
shared with third parties.
PRIVACY
DATA SET SKILLS FOR BUSINESS
17. PRIVACY
EU data protection rules mean that your personal data can only be processed
in certain situations and under certain conditions, such as:
– if you've given your consent (you must be informed that your data is being collected)
– if data processing is needed for a contract, for a job application or a loan request
– if there is a legal obligation for your data to be processed
– if processing is in your 'vital interest’, e.g. doctor needs access to your private medical
data
– if processing is needed to carry out tasks in the public interest or tasks carried out by
government, tax authorities, the police or other public bodies
Personal data about your racial or ethnic origin, sexual orientation, political
opinions, religious or philosophical beliefs, trade-union membership or health may not
be processed except in specific cases (e.g. when you've given explicit consent or when
processing is needed for reasons of substantial public interest, on the basis of EU or
national law). These rules apply to both public and private bodies.
Collection and processing of personal data
DATA SET SKILLS FOR BUSINESS
18. Data protection is the
process of safeguarding important
information from corruption,
compromise or loss. The
importance of data protection
increases as the amount of data
created and stored continues
to grow at unprecedented
rates.
Data Protection
DATA SET SKILLS FOR BUSINESS
19. ...is data which relates to a living individual who can be
identified:
from that data, or
from that data and other information which is in the
possession of the data controller,
And includes any expression of opinion about the individual
and any indication of the intentions of the data controller or
any other person in respect of the individual.
•...is PII data, consisting of Information as to:
•the racial or ethnic origin of the data subject,
•his political opinions,
•his religious beliefs or other beliefs of a similar nature,
•whether he is a member of a trade union,
•his physical or mental health or condition,
•his sexual life,
•the commission or alleged commission by him of any
offence.
Sensitive Personal Information
PII
Personally Identifiable Information
SPI
Data protection applies whenever we deal
with 2 types of information:
Data Protection
20. It is no exaggeration to say that we are
nothing more than a collection of data
to most of the institutions—and many
of the people—with whom we deal.
Big data poses enormous challenges
for data protection— both by
processors and regulators. It
simultaneously changes the context
and raises the stakes for Data
protection.
DATA SET SKILLS FOR BUSINESS
21. Impact: Credit/debit card information and/or contact
information of up to 110 million people compromised.
Details: The breach of Target costumers began before
Thanksgiving, but was not discovered until several weeks later.
The retail giant initially announced that hackers had gained
access through a third-party HVAC vender to its point-of-sale
(POS) payment card readers, and had collected about 40 million
credit and debit card numbers.cc
Impact: 145 million users compromised
Details: The online auction giant eBay reported a cyber
attack in May 2014 that it said exposed names, addresses,
dates of birth and encrypted passwords of all of its 145
million users. The company said hackers got into the
company network using the credentials of three corporate
employees, and had complete inside access for 229 days,
during which time they were able to make their way to the
user database.
Impact: 3 billion user accounts
Details: In September 2013 Yahoo announced it had been
the victim of the biggest data breach in history, likely by “a
state-sponsored actor,” in 2014. The attack compromised
the real names, email addresses, dates of birth and
telephone numbers of 500 million users. The company said
the "vast majority" of the passwords involved had been
hashed using the robust bcrypt algorithm.
With an increasing number of data breaches splashed across front
page news, companies have good reason to take security seriously
DATA SET SKILLS FOR BUSINESS
22. GDPR
1. The Basics of GDPR
2. Individual rights
3. Implementation of GDPR
As we were approaching this Big Data industrial
revolution, the laws governing its protection had
reached a point where they were a bit like an old
operating system. In need of an update or they
would have become unfit for purpose. Each
country, concerned about citizens’ personal data,
big data analytics and security, was attempting to
come up with its own legislation to control data. In
the European Union companies have to follow the
GDPR legislation.
DATA SET SKILLS FOR BUSINESS
23. General Data Protection
Regulation (GDPR) is a
single set of legislation
across Europe that gives
individuals get better
control of their personal
data.
GDPR
What is the
GDPR?
Why was
the GDPR
drafted?
When will
the GDPR
apply?
Who does
the GDPR
apply to?
When can I
process data
under the
GDPR?
What are
the
consequenc
es of not
acting by
GDPR?
THE BASICS OF GDPR
DATA SET SKILLS FOR BUSINESS
24. The EU's General Data Protection Regulation (GDPR) is the
result of four years of work by the EU to bring data protection
legislation into line with new, previously unforeseen ways that
data is now used.
Currently, the UK relies on the Data Protection Act 1998,
which was enacted following the 1995 EU Data Protection
Directive, but this will be superseded by the new legislation. It
introduces tougher fines for non-compliance and breaches,
and gives people more say over what companies can do with
their data. It also makes data protection rules more or less
identical throughout the EU.
GDPR
What is
the
GDPR?
Why was
the GDPR
drafted?
When will
the GDPR
apply?
Who does
the GDPR
apply to?
When can
I process
data under
the GDPR?
What are
the
consequen
ces of not
acting by
GDPR?
DATA SET SKILLS FOR BUSINESS
25. Firstly, the EU wants to give people
more control over how their personal
data is used
By strengthening data protection
legislation and introducing tougher
enforcement measures, the EU hopes
to improve trust in the emerging
digital economy.
Secondly, the EU wants to give
businesses a simpler, clearer legal
environment in which to operate,
making data protection law identical
throughout the single market.
The GDPR will apply automatically in all EU
member states from 25 May 2018.
While the overwhelming majority of IT
security professionals are aware of GDPR,
just under half of them are preparing for its
arrival, according to a snap survey of 170
cyber security staff by Imperva. Just 43%
are assessing GDPR's impact on their
company and changing their practices to
stay in step with data protection
legislation, Imperva found.
GDPR
What is
the
GDPR? Why was
the GDPR
drafted?
When will the
GDPR apply?
Who does
the GDPR
apply to?
When can
I process
data under
the GDPR?
What are
the
consequen
ces of not
acting by
GDPR?
26. 'Controllers' and 'processors' of data need to abide by the
GDPR.
A data controller states how and why personal data is
processed, e.g. government, while a processor is the party
doing the actual processing of the data, e.g. IT firm.
Even if controllers and processors are based outside the EU,
the GDPR will still apply to them so long as they're dealing
with data belonging to EU residents.
It's the controller's responsibility to ensure their processor
abides by data protection law and processors must
themselves abide by rules to maintain records of their
processing activities. If processors are involved in a data
breach, they are far more liable under GDPR than they were
under the Data Protection Act.
GDPR
What is
the
GDPR? Why was
the GDPR
drafted?
When will
the GDPR
apply?
Who does the
GDPR apply
to?
When can
I process
data under
the GDPR?
What are
the
consequen
ces of not
acting by
GDPR?
DATA SET SKILLS FOR BUSINESS
27. Once the legislation comes into effect, controllers must
ensure personal data is processed lawfully, transparently, and
for a specific purpose. Once that purpose is fulfilled and the
data is no longer required, it should be deleted.
Penalties for violation of record keeping, security, breach
notifications and privacy impact assessment are greater of
$10 million or 2% of entity‘s global gross revenue.
Penalties for violations olegal justification for processing
(consent), data subject rights and cross-border data transfers
are greater of $20 million or 4% of entity‘s global gross
revenue.
GDPR
What is
the
GDPR? Why was
the GDPR
drafted?
When will
the GDPR
apply?
Who does
the GDPR
apply to?
When can I
process data
under the
GDPR?
What are the
consequences
of not acting
by GDPR?
DATA SET SKILLS FOR BUSINESS
28. DATA SET SKILLS FOR BUSINESS
Why not take BREAK and READ
Article 1 in the Resource
Section:
Guide to General Data Protection
Regulations (GDPR)
29. INDIVIDUAL RIGHTS
A key part of the regulation requires consent to be given by the
individual whose data is held.
Organisations will need to be able to show how and when
consent was obtained. This consent does not need to be explicitly
given, it can be implied by the person‘s relationship with the
company.
However, the data obtained must be for specific, explicit and
legitimate purposes.
Individuals must be able to withdraw consent at any time and
have a right to be forgotten; if their data is no longer required for
the reasons for which it was collected, it must be erased.
DATA SET SKILLS FOR BUSINESS
30. The right to be informed
- The right to be informed
encompasses your obligation
to provide ‘fair processing
information’,
typically through a privacy
notice.
- It emphasizes the need for
transparency over how you
use personal data
The right of access
- Individuals have the right
to access their personal
data and supplementary
information.
- The right of access allows
individuals to be aware of
and verify the lawfulness
of the processing.
The right to rectification
- The GDPR gives individuals
the right to have personal data
rectified.
- Personal data can be
rectified if it is inaccurate or
incomplete.
The right to erase
- The right to erasure is also known
as ‘the right to be forgotten’.
- The broad principle underpinning
this right is to enable an individual
to request the deletion or
removal of personal data where
there is no compelling reason for
its continued processing.
The right to restrict
processing
- Individuals have a right to ‘block’ or
suppress processing of personal data.
- When processing is restricted, you are
permitted to store the personal data, but
not further process
it.
- You can retain just enough information
about the individual to ensure that the
restriction is respected
in future.
The right to data
portability
- The right to data portability
allows individuals to obtain and
reuse their personal data for their
own
purposes across different services.
- It allows them to move, copy or
transfer personal data easily from
one IT environment to another in
a safe and secure way, without
hindrance to usability.
The right to object
The right to object
Data Protection gives people the
right to object to the use of their
personal information in certain
circumstances.
You have the right to object to
your data being used for direct
marketing.
Rights in relation to
automated decision
making and profiling
- The GDPR has provisions on:
automated individual decision-making
(making a decision solely by automated
means without any
human involvement);and
profiling (automated processing of
personal data to evaluate certain things
about an individual).
- Profiling can be part of an automated
decision-making process.
DATA SET SKILLS FOR BUSINESS
31. AWARENESS
INFORMATION
YOU HOLD
COMMUNICATI
NG PRIVACY
INFORMATION
INDIVIDUAL
RIGHTS
SUBJECT ACCESS
REQUESTS
LAWFUL BASIS
FOR
PROCESSING
PERSONAL DATA
CONSENT CHILDREN
DATA BREACHES
DATA
PROTECTION
OFFICERS
INTERNATIONAL
GDPR IMPLEMENTATION
Companies are required to implement appropriate technical and organisational measures in
relation to nature, scope, context and purposes of their handling and rocessing of personal data.
Data protection safeguards must be designed into products and services from the earliest stages
of development.
12 steps you can make in your company to implementate GDPR
1 2 3 4
5 6 7 8
9 11 12
DATA SET SKILLS FOR BUSINESS
32. DATA SET SKILLS FOR BUSINESS
Why not take a BREAK and READ
Article 2 in the Resource Section:
Big Data: A Survey
-Min Chen
33. AWARENESS1
You should make sure that decision makers
and key people in your organization are
aware of GDPR and they appreciate the.
Implementing the GDPR could have
significant resource implications, especially
for larger and more complex organizations.
You may find compliance difficult if you leave
your preparations until the last minute.
DATA SET SKILLS FOR BUSINESS
34. INFORMATION YOU HOLD2
You should document what personal data you hold,
where it came from
and who you share it with. GDPR requires you to
maintain records of your processing activities.
You can’t confirm that data is correct or that your
organisation is in compliance unless you know what
personal data you hold, where it came from and who
you share it with. You should document this. Doing
this will also help you to comply with the GDPR’s
accountability principle, which requires organisations
to be able to show how they comply with the data
protection principles, for example by having effective
policies and procedures in place.
DATA SET SKILLS FOR BUSINESS
35. COMMUNICATING PRIVACY
INFORMATION
3
You should review your current privacy notices
and put a plan in place for making any
necessary changes in time for GDPR
implementation. Currently when collecting
data you must give people certain information,
e.g. identity and intended use.
This is usually done through a privacy notice.
There will now be additional requirements.
DATA SET SKILLS FOR BUSINESS
36. 4 INDIVIDUAL RIGHTS
Check your procedures to ensure they cover all the
rights individuals have.
The GDPR includes the following rights for individuals:
- the right to be informed;
- the right of access;
- the right to rectification;
- the right to erasure;
- the right to restrict processing;
- the right to data portability;
- the right to object; and
- the right not to be subject to automated decision-
making including
profiling.
DATA SET SKILLS FOR BUSINESS
37. 5 SUBJECT ACCESS REQUEST
You should update your procedures and plan how you will
handle requests to take account of the new rules:
- In most cases you will not be able to charge for
complying with a request.
- You will have a month to comply, not the current 40
days.
- You can refuse or charge for requests that are manifestly
unfounded or excessive.
- If you refuse a request, you must tell the individual why
and that
they have the right to complain to the supervisory
authority and to
a judicial remedy.
You must do this without undue delay and at the latest,
within one month.
DATA SET SKILLS FOR BUSINESS
38. LAWFUL BASIS FOR PROCESSING
PERSONAL DATA
6
You should identify the lawful basis for your
processing activity in GDPR and update your
privacy notice to explain it.
Under the GDPR some individuals’ rights will be
modified depending on your lawful basis for
processing their personal data.
The most obvious example is that people will have
a stronger right to have their data deleted where
you use consent as your lawful basis for
processing. You will also have to explain your
lawful basis for processing personal data in your
privacy notice and when you answer a subject
access request.
DATA SET SKILLS FOR BUSINESS
39. CONSENT7
You should review how you seek, record
and manage consent and whether you
need to make any changes. Refresh existing
consents now if they don’t meet the GDPR
standard.
You should read the guidance the ICO has
published on consent under the GDPR, and
use our consent checklist to review your
practices. Consent must be freely given,
specific, informed and unambiguous.
DATA SET SKILLS FOR BUSINESS
40. 8 CHILDREN
Do you need to put systems in place to verify
individuals’ ages? Or obtain parental consent.
GDPR will bring in special protection for children’s
personal data, particularly in the context of
commercial internet services such as social
networking.
The GDPR sets the age when a child can give their
own consent to this processing at 16 If a child is
younger then you will need to get consent from a
person holding ‘parental responsibility’. This could
have significant implications if your organisation
offers online services to children and collects their
personal data.
DATA SET SKILLS FOR BUSINESS
41. 9 DATA BREACHES
You should make sure you have the right procedures in
place to detect, report and investigate a personal data
breach.
GDPR introduces a duty on all organisations to report
certain types of data breach to the ICO, and in some
cases, to individuals
You should put procedures in place to effectively detect,
report and
investigate a personal data breach.
You may wish to assess the types of personal data you
hold and document where you would be required to
notify the ICO or affected individuals if a breach occurred.
Larger organisations will need to develop policies and
procedures for managing data breaches. Failure to report
a breach when required to do so could result in a fine, as
well as a fine for the breach itself.
42. DATA PROTECTION OFFICERS
You should designate someone to take responsibility for
data protection compliance.
You may need to designate a DPO
It is most important that someone in your organisation,
or an external data protection advisor, takes proper
responsibility for your data protection compliance and
has the knowledge, support and authority to carry out
their role effectively.
10
DATA SET SKILLS FOR BUSINESS
43. DATA PROTECTION OFFICERS
You should consider whether you are required to
formally designate a Data Protection Officer (DPO). You
must designate a DPO if you are:
-a public authority (except for courts acting in their
judicial
capacity);
- an organisation that carries out the regular and
systematic
monitoring of individuals on a large scale; or
- an organisation that carries out the large scale
processing of special categories of data, such as health
records, or information about criminal convictions. The
Article 29 Working Party has produced guidance for
organisations on the designation, position and tasks of
DPOs.
10
DATA SET SKILLS FOR BUSINESS
44. INTERNATIONAL11
If your organisation operates in more than one EU
member state, you should determine your lead
data protection supervisory authority and
document this.
The lead authority is the supervisory authority in
the state where your main establishment is. Your
main establishment is the location where your
central administration in the EU is or else the
location where decisions about the purposes and
means of processing are taken and implemented.
DATA SET SKILLS FOR BUSINESS
45. No matter what volumes of data
they’re dealing with, it’s crucial for
businesses to get a good handle on
where their data is, how it’s stored
and who has access to it.
The GDPR comes at a time when
customer expectations have never
been higher over the privacy of
their data. Putting the power back
into the hands of customers can
only serve the businesses who rely
on them, helping to build a far
more positive relationship and
engender consumer trust.
DATA SET SKILLS FOR BUSINESS
46. LEGAL GLOSSARY
PERSONAL DATA
Any information relating to a person who can be identified,
directly or indirectly, in particular by reference to an identifier
such as a name, an identification number, location data, online
identifier or to one or more factors specific to the physical,
physiological, genetic, mental, economic, cultural or social
identity of that person.
CONTROLLERS
Owners of the data, who are responsible for data protection and
make sure processors are compliant.
PROCESSORS
Work with the data and have to take responsible actions with
the data. The relationship between Controllers and Processor
must be documented.
PROFILING
Any automated processing of personal data to determine
certain criteria about a person.
BREACH AND NOTIFICATION
A breach of security leading to the accidental or unlawful
destruction, loss, alteration, unauthorised disclosure of, or
access to, personal data transmitted, stored or otherwise
processed.
DATA SUBJECT ACCESS REQUESTS
The right of the individual to understand what is stored and
how it is used.
DATA PROTECTION OFFICERS
Public Authorities who have expert knowledge on data
protection laws. They deal with a large scale processing of
special types of personal data.
DATA SET SKILLS FOR BUSINESS
47. DATA SET SKILLS FOR BUSINESS
FINISH by WATCHING Video 1
in the Resource Section:
Digital ethics and the future of humans in
a connected world
-Gerd Leonhard (Ted X talk)