The data value map for GDPR - How to extract Business Value from your GDPR Pr...Ken O'Connor
In this pack from the joint webinar between DAMA UK and DAMA Ireland, Ken O'Connor explains how smart businesses are using the DataValueMap.com (from Cork University Business School) to visually map their personal data supply chain and extract business value in the process.
The DataValueMap.com is a paper based, tech free, silo busting business tool that helps business managers build a shared understanding of any data initiative.
It's perfect for enabling business people to quickly sketch how critical information (such as personal data in the case of GDPR) flows through their business.
Ken explains how The Data Value Map applies "Nudge Principles" (including "Choice Architecture" and "Design Thinking") to Nudge the heads of each business function, i.e. the data stakeholders, to take responsibility for their role in the personal data "Information Supply Chain".
Data Protection Officers (DPOs) will find this very useful when performing Data Protection Impact Assessments (DPIAs).
Columbia Business School's Center on Global Brand Leadership, in conjunction with the Aimia Institute, surveyed over 8000 global consumers to uncover how they perceive
and act on sharing their data with companies.
More information is available from:
http://gsb.columbia.edu/globalbrands
or
http://aimia.com
TrustArc Webinar-Advertising, Privacy, and Data Management Working TogetherTrustArc
Today, more and more companies use advertising technologies (AdTech) to reach their consumers and better understand their preferences. This can lead to multiple data protection risks. Data privacy awareness is increasing due to seismic developments in the industry brought about by key players such as Google and Apple. In parallel, global regulations set stricter guidelines around the collection, storage, and use of personal data.
This is not over. With the decisions coming out soon on analytics, how will the advertising technologies landscape adjust? Ultimately, how can advertising, privacy, and data management work together?
Our panel in this webinar explored the practical steps your organization should take to ensure that its digital advertising practices are compliant with data protection laws.
This webinar reviews:
- The current practices and developments in the AdTech industry
- The laws and regulations governing AdTech
- How to address the privacy issues related to advertising technology
The data value map for GDPR - How to extract Business Value from your GDPR Pr...Ken O'Connor
In this pack from the joint webinar between DAMA UK and DAMA Ireland, Ken O'Connor explains how smart businesses are using the DataValueMap.com (from Cork University Business School) to visually map their personal data supply chain and extract business value in the process.
The DataValueMap.com is a paper based, tech free, silo busting business tool that helps business managers build a shared understanding of any data initiative.
It's perfect for enabling business people to quickly sketch how critical information (such as personal data in the case of GDPR) flows through their business.
Ken explains how The Data Value Map applies "Nudge Principles" (including "Choice Architecture" and "Design Thinking") to Nudge the heads of each business function, i.e. the data stakeholders, to take responsibility for their role in the personal data "Information Supply Chain".
Data Protection Officers (DPOs) will find this very useful when performing Data Protection Impact Assessments (DPIAs).
Columbia Business School's Center on Global Brand Leadership, in conjunction with the Aimia Institute, surveyed over 8000 global consumers to uncover how they perceive
and act on sharing their data with companies.
More information is available from:
http://gsb.columbia.edu/globalbrands
or
http://aimia.com
TrustArc Webinar-Advertising, Privacy, and Data Management Working TogetherTrustArc
Today, more and more companies use advertising technologies (AdTech) to reach their consumers and better understand their preferences. This can lead to multiple data protection risks. Data privacy awareness is increasing due to seismic developments in the industry brought about by key players such as Google and Apple. In parallel, global regulations set stricter guidelines around the collection, storage, and use of personal data.
This is not over. With the decisions coming out soon on analytics, how will the advertising technologies landscape adjust? Ultimately, how can advertising, privacy, and data management work together?
Our panel in this webinar explored the practical steps your organization should take to ensure that its digital advertising practices are compliant with data protection laws.
This webinar reviews:
- The current practices and developments in the AdTech industry
- The laws and regulations governing AdTech
- How to address the privacy issues related to advertising technology
Property & Casualty: Deterring Claims Leakage in the Digital AgeCognizant
For property and casualty insurers, the persistent and vexing problem of claims leakage can be effectively curtailed by applying digital technology with cutting-edge clarity.
D2 d turning information into a competive asset - 23 jan 2014Henk van Roekel
Understanding the evolution of Business Intelligence and Analytics and the challenges and opportunities that come with it. Exploring CGI's Data2Diamonds™ approach ensuring financial sound, technical viable and socially desirable Big Data initiatives.
Technology Innovation Trends In Insurance | Navdeep Arora Navdeep Arora
This presentation talks about ‘Technology Innovation Trends In Insurance’. This covers seven themes that are reshaping supply & demand of #insurance globally, premium & profit pools are migrating across the #insurance value chain. Explains how value creation opportunities are different across mature & developing markets, how #technology & digital capabilities that target value chain effectiveness (not just scale efficiencies) offer compelling #investment opportunities. Also has #InsurTech levers and start-up examples in non-life insurance and life insurance.
8 reasons you need a strategy for managing information...before it's too lateJohn Mancini
Highlights from a keynote presentation that complements AIIM's free e-book -- 8 reasons you need a strategy for managing information...before it's too late.
E-book available at http://www.aiim.org/8things
Retailers increasingly recognize blockchain’s transformative ability to streamline operations, ensure product authenticity and enable tighter supply chain collaboration, our latest study reveals. However, most are still working to fully understand how to harness its potential inside their four walls and beyond.
Big Data in Financial Services: How to Improve Performance with Data-Driven D...Perficient, Inc.
Most banking and financial services organizations have only scratched the surface of leveraging customer data to transform their business, realize new revenue opportunities, manage risk and address customer loyalty. Yet a business’s digital footprint continues to evolve as automated payments, location-based purchases, and unstructured customer communications continue to influence the technology landscape for financial services.
Protect Your Revenue Streams: Big Data & Analytics in TaxCapgemini
The game has changed since the onset of the financial crisis. Governments aiming to reduce budget deficits can only deliver so much through spending cuts. It is now even more vital that tax agencies ensure individuals and businesses pay the tax they owe, and that welfare fraud and error are minimised. Pretty will explain how he helps tax and welfare agencies tackle noncompliance, evasion and error. He will share client stories where billions of euros were saved, generating a return of at least 25 times the original investment.
By Ian Pretty,
Vice President, Global Tax & Welfare Leader
Presentation by Kuldar Taveter, Senior Consultant in e-Government and Digital Economy, Estonia, at the 3rd and last seminar in the series, held on 1 April 2021, which puts the focus on moving towards seamless public service delivery. This 3rd event takes place in the framework of a series of three webinars organised by the SIGMA Programme, a joint initiative of the OECD and EU, principally financed by the EU, on the role of life events in end-to-end public service delivery.
5 Reasons Why Blockchain is a Financial Services Game ChangerCognizant
Financial institutions can’t linger in their experimentation with blockchain technology — they need to move aggressively or be left behind by the rapid pace of innovation, according to our study.
Overview of major factors in big data, analytics and data science. Illustrates the growing changes from data capture and the way it is changing business beyond technology industries.
Fintech workshop Part I - Law Society of Hong Kong - XccelerateHenrique Centieiro
What is fintech? What are the technologies leveraging Fintech? How AI, Blockchain, Cloud and Data Analytics are changing the financial world?
Henrique works as Innovation Project Manager implementing Fintech and Blockchain Projects for the Financial Industry
Find me here: linkedin.com/in/henriquecentieiro
Webinar: Digital Health Strategy: Leveraging Emerging Technologies in HealthcareIntellectsoft
WEBINAR VIDEO - https://www.intellectsoft.net/l/31/webinar-digital-healthcare
JOIN OUR WEBINAR TO:
- Explore what changed for healthcare practices and operations during COVID-19 and predict what leaders can expect in terms of recovery;
- Discover today’s featured examples of our clients’ technology solutions that can help you provide better and more efficient services;
- Discuss how to evolve and adapt for the rest of 2020 and into 2021 using emerging technologies and more efficient solutions.
BEST FOR:
- Сhief Medical Officers
- Doctors Pharmaceuticals
- HR Department Outstaffing
- Telemedicine Workers
- Insurance Companies
- Pharmacies
- Laboratories
- Private Hospitals
- Academical Health Centres
- Private Healthcare Facilities
- Management Information Systems
https://www.intellectsoft.net/
Presentation on citizen-consumer permission-based data sharing, the four challenge areas in data innovation and the Personal Data & Trust program by Dr Matt Stroud, Head of Personal Data and Trust at Digital Catapult Centre. Presented at the Data-sharing Discovery Day on 26 January in London.
Presentation of Digital Catapult's personal data activities in relation to Industry 4.0, digital transformation and advanced manufacturing actions, as presented by Digital Catapult's Michele Nati, Lead Technologist of Personal Data and Trust.
Michele Nati, Privacy and Trust Technical Lead at the Digital Catapult, gave this presentation about the organisation's collaborative projects at the ICW's Collaborative Working in the Digital Economy event.
Property & Casualty: Deterring Claims Leakage in the Digital AgeCognizant
For property and casualty insurers, the persistent and vexing problem of claims leakage can be effectively curtailed by applying digital technology with cutting-edge clarity.
D2 d turning information into a competive asset - 23 jan 2014Henk van Roekel
Understanding the evolution of Business Intelligence and Analytics and the challenges and opportunities that come with it. Exploring CGI's Data2Diamonds™ approach ensuring financial sound, technical viable and socially desirable Big Data initiatives.
Technology Innovation Trends In Insurance | Navdeep Arora Navdeep Arora
This presentation talks about ‘Technology Innovation Trends In Insurance’. This covers seven themes that are reshaping supply & demand of #insurance globally, premium & profit pools are migrating across the #insurance value chain. Explains how value creation opportunities are different across mature & developing markets, how #technology & digital capabilities that target value chain effectiveness (not just scale efficiencies) offer compelling #investment opportunities. Also has #InsurTech levers and start-up examples in non-life insurance and life insurance.
8 reasons you need a strategy for managing information...before it's too lateJohn Mancini
Highlights from a keynote presentation that complements AIIM's free e-book -- 8 reasons you need a strategy for managing information...before it's too late.
E-book available at http://www.aiim.org/8things
Retailers increasingly recognize blockchain’s transformative ability to streamline operations, ensure product authenticity and enable tighter supply chain collaboration, our latest study reveals. However, most are still working to fully understand how to harness its potential inside their four walls and beyond.
Big Data in Financial Services: How to Improve Performance with Data-Driven D...Perficient, Inc.
Most banking and financial services organizations have only scratched the surface of leveraging customer data to transform their business, realize new revenue opportunities, manage risk and address customer loyalty. Yet a business’s digital footprint continues to evolve as automated payments, location-based purchases, and unstructured customer communications continue to influence the technology landscape for financial services.
Protect Your Revenue Streams: Big Data & Analytics in TaxCapgemini
The game has changed since the onset of the financial crisis. Governments aiming to reduce budget deficits can only deliver so much through spending cuts. It is now even more vital that tax agencies ensure individuals and businesses pay the tax they owe, and that welfare fraud and error are minimised. Pretty will explain how he helps tax and welfare agencies tackle noncompliance, evasion and error. He will share client stories where billions of euros were saved, generating a return of at least 25 times the original investment.
By Ian Pretty,
Vice President, Global Tax & Welfare Leader
Presentation by Kuldar Taveter, Senior Consultant in e-Government and Digital Economy, Estonia, at the 3rd and last seminar in the series, held on 1 April 2021, which puts the focus on moving towards seamless public service delivery. This 3rd event takes place in the framework of a series of three webinars organised by the SIGMA Programme, a joint initiative of the OECD and EU, principally financed by the EU, on the role of life events in end-to-end public service delivery.
5 Reasons Why Blockchain is a Financial Services Game ChangerCognizant
Financial institutions can’t linger in their experimentation with blockchain technology — they need to move aggressively or be left behind by the rapid pace of innovation, according to our study.
Overview of major factors in big data, analytics and data science. Illustrates the growing changes from data capture and the way it is changing business beyond technology industries.
Fintech workshop Part I - Law Society of Hong Kong - XccelerateHenrique Centieiro
What is fintech? What are the technologies leveraging Fintech? How AI, Blockchain, Cloud and Data Analytics are changing the financial world?
Henrique works as Innovation Project Manager implementing Fintech and Blockchain Projects for the Financial Industry
Find me here: linkedin.com/in/henriquecentieiro
Webinar: Digital Health Strategy: Leveraging Emerging Technologies in HealthcareIntellectsoft
WEBINAR VIDEO - https://www.intellectsoft.net/l/31/webinar-digital-healthcare
JOIN OUR WEBINAR TO:
- Explore what changed for healthcare practices and operations during COVID-19 and predict what leaders can expect in terms of recovery;
- Discover today’s featured examples of our clients’ technology solutions that can help you provide better and more efficient services;
- Discuss how to evolve and adapt for the rest of 2020 and into 2021 using emerging technologies and more efficient solutions.
BEST FOR:
- Сhief Medical Officers
- Doctors Pharmaceuticals
- HR Department Outstaffing
- Telemedicine Workers
- Insurance Companies
- Pharmacies
- Laboratories
- Private Hospitals
- Academical Health Centres
- Private Healthcare Facilities
- Management Information Systems
https://www.intellectsoft.net/
Presentation on citizen-consumer permission-based data sharing, the four challenge areas in data innovation and the Personal Data & Trust program by Dr Matt Stroud, Head of Personal Data and Trust at Digital Catapult Centre. Presented at the Data-sharing Discovery Day on 26 January in London.
Presentation of Digital Catapult's personal data activities in relation to Industry 4.0, digital transformation and advanced manufacturing actions, as presented by Digital Catapult's Michele Nati, Lead Technologist of Personal Data and Trust.
Michele Nati, Privacy and Trust Technical Lead at the Digital Catapult, gave this presentation about the organisation's collaborative projects at the ICW's Collaborative Working in the Digital Economy event.
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...MicheleNati
Presentation showing Digital Catapult interest and fit in Industrie 4.0 movement. Digital Technologies for Manufacturing Innovation: Embracing Industry 4.0 - Nottingham, November 30th
Digital Technologies for Manufacturing Innovation: Industry 4.0Digital Catapult
Michele Nati, Lead Technologist in Personal Data and Trust at the Digital Catapult, delivered this presentation about how they are working to improve digital technologies and boost manufacturing innovation.
As the confluence of several mature and emerging technologies, the Internet of Things (IoT) is rapidly developing into a vibrant new marketplace. What are important considerations for technology, media, and telecom (TMT) companies as they compete for opportunities? This presentation covers:
• Questions TMT executives should be asking about impacts of IoT technologies, performance improvement opportunities, and where value can be generated.
• Building an IoT ecosystem where all players benefit – defining different players' roles and relationships, and already-successful tactics.
• Security and privacy challenges, including how data protection responsibility is assigned and monitored, and defining appropriate security and privacy standards.
Explore this quickly developing new opportunity for TMT companies.
Get more IoT insights: http://www.deloitte.com/us/iot_ecosystem
Shaping the Future of Trusted Digital IdentityNoreen Whysel
May 2019 presentation by Noreen Whysel to the CARIN Technology Committee. Discusses the Identity Ecosystem Framework Registry (idefregistry.org) and proposed health data use cases for potential trusted identity API for healthcare.
The solution to many corruption challenges in procurement is the use of advanced technology such as AI, data analytics and blockchain. This presentation was made at the MICG Annual Procurement Conference in Kuala Lumpur on 2nd April 2019.
Presentation by Jennifer MacDonald, Mott Macdonald at the 2018 Construction Mobile IT Conference 'Digital Construction: Lighting the Way' at the Hallam Conference Centre, London on 24th and 25th May 2018. More information at http://www.comit.org.uk/cconference-2018
Yury Birchenko, CTO at NWave, shared successful examples of LPWAN technologies and explained how to choose the right LPWAN at Digital Catapult's LPWAN London Meetup.
Richard Marshall, IoTSF Plenary Chair and CEO at Xitex Ltd, explains how you can secure your IoT products in these slides, presented recently at Digital Catapult's LPWAN London meetup.
Check out slides presented by Mo Haghighi, Research Scientist at Intel Labs Europe, which explore how to solve urban challenges at the Olympic Park. These slides were presented at Digital Catapult's LPWAN London meetup.
Thinking about applying for Future Cities Catapult's Things Connected Open Call? These slides, presented at Digital Catapult's LPWAN meetup, provide more information on how to get involved.
Presentation notes from Digital Catapult's F-Interop Meetup (18/7/2016), covering IoT interoperability challenges and opportunities, as well as the presentation of F-Interop Open Call process and workshop.
This presentation created by Digital Catapult's HR Director Allyssa Gregory, was presented at their Startup Session on hiring and firing staff (16/2/16).
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Elevating Tactical DDD Patterns Through Object Calisthenics
Digital Transformation Business Evolution
1. Digital Transformation &
Open Innovation
Trust Framework Initiative
Michele Nati
Privacy and Trust Technical Leader
Personal Data and Trust Programme
London, 22 October, Digital Transformation Conference
2. A national centre to rapidly
advance the UK’s best
digital ideas
Completely
neutral
Not for profit,
private limited
company
Who are we?
4. We are NOT a funder, incubator
or accelerator!
Our aim is to work with these
organisations, not duplicate
To unlock proprietary data in
faster, better and more trusted ways
Digital Catapult Mission
5. Our focus is on the Data Value Chain
How We Do This?
6. Data from
Internet of
Things devices
Personal Data
Data with
ownership
rights
Closed
Organisational
Data
Where does “our” data come from?
7. Pit Stops
Hands-on help with specific issues around growth and
scaling from our network of high-calibre experts
Intense experience over two days
10-30 growing companies, deep technical experts, academics
and students, larger corporates
Co-creation workshops
Bring together relevant stakeholders to identify
problems, better scope them, design solutions
8. The commercial benefits of a personal data
sharing eco-system
• Personal data flows are the nervous system of any consumer facing
business, they trigger the muscles to move when acquisition, cross-sell
or churn events are identified.
• As data becomes more abundant, this will be ever more critical to how
“core businesses” compete in the future
• Being timely and relevant reduces waste and cost, “50% of my marketing
budget is wasted….” etc
• Above all, it enables a better customer experience because
organisations can be more responsive to their customers needs
9. The opportunity is horizontal…
Vertical = Limited use cases e.g fraud
Horizontal = Many use cases
For example:
• Mobile phone data to alert social
care if patient is unexpectedly
idle
• Shopping data maybe used to
inform healthcare advice
• Bank data to inform targeting of
retail offers e.g “bought
broadband 12 months ago…so”
10. What individuals think about personal data?
• Consent
• 65% are insure if data is shared without their consent
• Responsibility
• 30% felt it was their own responsibility to understand personal data issues
• 31% see organizations that hold data as responsible for its protection
• Protection
• 29% felt they had responsibility to protect their own information
• Understanding
• 38% don’t know what ‘personal data’ means, but 96% claim to
* http://tinyurl.com/q2n6e2w
11. How much consumers trust organisations?
• Most trusted
• 44% of consumers trust the public sector most with their personal data
• Lack of clarity
• 30% feel the retail sector is not clear on how use their personal data
• Least trusted
• 2% choose telecoms as the most trusted sector
• Nervous sharing
• 60% feel uncomfortable sharing personal data
• Loosing control
• 76% primary concern: no control over how its shared or who with
* http://tinyurl.com/q2n6e2w
12. Benefits of personal data sharing
• Greedy Companies
• 79% think organisations use data only for their monetary gain
• Overall financial benefit
• £15bn untapped wealth for UK consumers
• The incentive to share
• 30% of consumers believe “to improve services and benefit” is the most important
incentive for sharing personal data
• How to incentivise
• 43% said the main incentive for sharing personal data is if it was going to be used to
improve society
* http://tinyurl.com/q2n6e2w
15. Breaking down the barriers
Building Trust:
Removing Friction: Need to solve three sources of friction:
Technical: How to define and physically transfer the data
Legal: How to establish the users identity and assert
permission within each siloed system
Commercial: How to agree the price of access/transfer
Need to empower the customer:
Ethics: Recognise & respect the consumer’s wishes
Control: Give tools/dashboards to enable real control
Compliance: Verify orgs are sticking to the rules
Communication: Kitemark for those in the ethical sharing club
16. Data Sharing & Trust Frameworks
Scheme
Operator
Customer’s
digital agent
The reliant
party
The Attribute
provider
The Scheme
(rules)
Auditors
17. Use case pilots
Value with Policy
• Validated attributes in personal store
• Automate DWP benefit calculation
• Benefit issued as GovCoin
• Expenditure aligned to policy
Anonymous marketing
• Enable the individual to create
anonymous persona
• Use persona to target more relevant
services to individual
Health and social care
• Inefficient due to lack of co-
ordination between agencies
• Additional complexity of personal
care budgets
• All agencies give data to patient
• Patient controls sharing
Portable KYC
• Portable digital ID (Verify/bank KYC)
• To be used at any bank for opening
and transferring accounts
• Future applicability to other sectors,
taking out mobile phone contract etc
19. Evolution to “Operational Scheme” & “Lab”
Scheme
Authority
Data Lab
Trust
Framework
Initiative
• Tests TFI
• 4 core use
cases
• Sharing pilot
infrastructure
and
technologies
• Consumer
permission
based sharing
• Operational
system
• With oversight
body
• Innovations
• Block chain and
other tech
• Catapult, ATI,
Corps and HMG
20. Steps to achieve this
Data Lab
Scheme
Authority
Trust
Framework
Initiative
1. Establish Scheme
Authority, with a
board representing
the member
constituencies
4. Use the tech trial
learnings to help
define the TF
2. Split the use cases
between a small
number of consortia
3. Run tech trials
5. Spin out consortia
as Scheme Operators
21. Scheme Authority
Operational Management team
Founding members
who protect articles
Statement
of
community
& interest
CIC Board
Community Interest Company as
Scheme Authority• It’s job is to evolve the digital rules
and appoint auditors
• Needs to represent its members
• Key constituencies:
• Consumers
• Private sector
• Public sector
• Not for profits
• Establish as Not-for-profit
• Will establish entity as CIC
by guarantee
22. Scheme Operator emergence
Big tent for
relevant
tech
suppliers
Consortia 1
Consortia 2
2-3 use cases
2-3 use cases
Facilitate them to form 2
consortia, each able to
deliver the Scheme
Operator functionality
Convene tech companies
who each have part of
the Scheme Operator
functionality
Each consortia to trial a
number of use cases
Successful
consortia
become
licensed by the
Scheme
Authority
23. The road to “operational” Scheme Operator
Phase 2 Phase 3
Consortium
1
Consortium
2
Consortium
1
Consortium
3
Consortium
2
TFI -
Operational
Phase1
Use case 1
Use case 2
Use case n
Consortia implement
the assigned use cases
(defining APIs and
standards)
Consortia test
interoperability,
aligning APIs
and standards
Scheme authority set
up, lessons learned,
standards and APIs
defined
24. Creating a user centric “Data Sharing Lab”
• The above “tech trials” process is an example of
open innovation.
• We want to promote ongoing innovation in this
Ecosystem:
• The consortia formation and use cases are an
exemplars
• We will execute the use cases through a
repeatable “open innovation Lab structure”
• The Lab will remain post trials and serve as the
Scheme Authorities innovation capability, acting as
a open hub connecting “innovators with problems
owners”.
25. The Scheme Authority will work with the Catapult to start the Lab
with with a number of founding partners
The Catapult brings……
• It’s a neutral entity, not-for-profit, spans private and public sectors
• Unique network of thousands of UK SME and academic innovators (inc PDTN)
• Unique partnership with Alan Turing institute for data (& block chain) research
• Unique national centre and network of local centers
• Home of IoTUK, huge cross-over with personal/closed data sharing
• Convenes a x-Gov data sharing round table
• Strong links to the TISA and OBWG projects
• Is an member of and are developing an engagement model with the OIX
The Catapult was founded by the HMG to promote innovation with closed data to
facilitate growth in the UK digital economy
26. Systemic link between requirement, innovation and
operation, for rapid scaling
Corporates and investors
Stakeholder
defined
roadmap for
innovation
required by
corporates,
HMG &
Consumers Technologies and platforms
SME innovators academics
Regulators, Government
LAB
Investment &
integration with
live operational
“Trust
Framework” for
rapid scaling
27. The Lab
Government Corporates
Board of Founding partners
Members and Innovators
Scheme Authority
Project outcome
• Iterate
• Integrate
• Finance to scale
Data LAB
Org
Distributed ledger
Digital Catapult / Partners SME’s
Capabilities
Centralised and distributed data
Data exchange and trading
Verified attributes and identity
KYC
Health&
Social
Anonymous
Marketing
Policywith
Value
Others…
UseCase
Projectsalignedto
crosssectorroadmap
ToLiveOperatingEnvironment
In
funnel
28. Lab method of operation
Phase 1 Phase 2 Phase 3
Pitstop
30+ selected
innovators
2 days
Development
3-5 selected
innovators
1-3 months
Trials
The Lab selection
innovators from its
network in response to
a client request.
Holds 2 day innovation
event with them &
client
Key innovators are
selected to work with
client and Lab to
develop solution
&
Helps innovators
product development
The Lab organises
trials of the solution
&
Helps innovators to
define business model
and GTM approach
31. PDTN: The Structure
• Over 500 members so far
• 9 core groups
• Oxford Area
• Health and Social Care
• Design
• Legal and Regulation
• Social Innovation
• Digital ID
• Corporate Transformation
• PIM
• Economics
• We raise questions, trigger discussions, organize round-table, make
impact, transfer knowledge
32. Want to know more?
http://www.digitalcatapultcentre.org.uk/open-calls/trust-
framework/
http://www.pdtn.org
33. Thank you
Digital Catapult Centre
101 Euston Road
London
NW1 2RA
Twitter: @DigiCatapult
Email: michele.nati@cde.catapult.org.uk
www.digitalcatapultcentre.org.uk