This document summarizes key points from a presentation about proposed changes to the EU's Data Protection Regulation. It discusses expanded definitions and new requirements for consent, data breaches, subject access requests and more. Consent would need to be explicit under the new rules. IP addresses and cookies may be defined as personal data, affecting digital marketing. Data subjects could request deletion of data. Organizations would face stricter security rules and larger fines for noncompliance. The impact on direct marketing could be significant.
This document provides an agenda and summaries for a legal update event on data protection hosted by Pinsent Masons. The event will cover the current position of the EU Draft Data Protection Regulation and potential changes, consumer rights legislation, and ICO guidance on direct marketing. Speakers will discuss the impact of these regulations and guidance on businesses, including increased compliance obligations, sanctions for non-compliance, and restrictions on data processing and direct marketing. The event aims to help businesses understand and prepare for new data protection laws and regulations.
This document provides a summary of a presentation on data protection law and the proposed EU Data Protection Regulation. Key points from the proposed regulation discussed include expanded definitions of personal data, the requirement for explicit consent, the right to be forgotten, increased accountability and security breach notification requirements, more sanctions for non-compliance, and the direct coverage of data processors. Impacts on practices like profiling, use of IP addresses and cookies, and responding to access requests are also covered. The presentation provides timelines for the regulation and discusses lobbying efforts regarding the proposals.
The document summarizes key points from a legal update seminar on the proposed EU Data Protection Regulation. It discusses proposed changes such as expanded definitions of personal data, the need for explicit consent, the right to be forgotten, data breach notification requirements, and enhanced sanctions for noncompliance. The proposed regulation would significantly impact how companies process and protect personal data.
This document provides an overview of trends and issues from the Information Commissioner's Office (ICO), including key statistics on Data Protection Act (DPA) complaints and enforcement actions. Common data protection failures seen by the ICO include a lack of training, inadequate policies and procedures, and failure to implement appropriate technical solutions like encryption. The ICO has a range of regulatory and enforcement options, including civil monetary penalties (CMPs), with a framework that considers the seriousness, aggravating/mitigating factors, financial impact, objectives, and consistency with past cases. An example CMP of £50,000 issued to Amber UPVC Fabrications Ltd is described.
This document summarizes a legal update meeting on the EU Data Protection Regulation. The meeting agenda included presentations on the future of the EU Data Protection Regulation and how it will impact direct marketing practices. Key points from the presentations include:
- The current EU Data Protection Directive is outdated and a new Regulation is being negotiated that would impose stricter consent requirements, rights for individuals, and sanctions for non-compliance.
- Explicit consent may be required for all data processing and marketing under the new Regulation.
- Individuals may have new rights like "the right to be forgotten" and easier access to their personal data.
- Businesses need to prepare for potential fines of up to 2% of global annual turnover for violations
The document provides an overview of a data protection seminar, including:
- The agenda which covers understanding data protection law, practical tips for marketers, and a question period.
- An introduction to why data protection is important for protecting information, avoiding reputational damage, making good business sense, and avoiding enforcement actions.
- A summary of the key aspects of the Data Protection Act 1998 and Privacy and Electronic Communications Regulation 2003, including definitions, principles, and rules regarding marketing communications.
- Practical tips for marketers regarding data capture, obtaining permissions, and regaining lost permissions in compliance with regulations.
This document summarizes a legal update event held by the DMA (Direct Marketing Association) on data protection. It includes:
- An agenda for the day covering upcoming changes to EU data protection laws and their implications for direct marketing.
- A summary of proposed changes in the EU's draft Data Protection Regulation, including stricter consent requirements, increased data subject rights like the "right to be forgotten", and heavier sanctions for non-compliance.
- An analysis of how these changes may impact direct marketing practices, such as the need to obtain explicit consent, review existing databases and consent language, and increase compliance costs.
Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...Kevin O'Shea
Together with my (future) partner, Peter Imse, these are the slides for our June 2011 CLE presented in conjunction with the First American Title Insurance Company. The topics in these slides were revisited in my June 2014 presentation (Avoiding Technical Fouls:Selected Ethical Issues in Advertising, Social Media, and Cloud Computing). Nevertheless, there is some interesting data in this presentation that does not appear in my June 2014 slides.
This document provides an agenda and summaries for a legal update event on data protection hosted by Pinsent Masons. The event will cover the current position of the EU Draft Data Protection Regulation and potential changes, consumer rights legislation, and ICO guidance on direct marketing. Speakers will discuss the impact of these regulations and guidance on businesses, including increased compliance obligations, sanctions for non-compliance, and restrictions on data processing and direct marketing. The event aims to help businesses understand and prepare for new data protection laws and regulations.
This document provides a summary of a presentation on data protection law and the proposed EU Data Protection Regulation. Key points from the proposed regulation discussed include expanded definitions of personal data, the requirement for explicit consent, the right to be forgotten, increased accountability and security breach notification requirements, more sanctions for non-compliance, and the direct coverage of data processors. Impacts on practices like profiling, use of IP addresses and cookies, and responding to access requests are also covered. The presentation provides timelines for the regulation and discusses lobbying efforts regarding the proposals.
The document summarizes key points from a legal update seminar on the proposed EU Data Protection Regulation. It discusses proposed changes such as expanded definitions of personal data, the need for explicit consent, the right to be forgotten, data breach notification requirements, and enhanced sanctions for noncompliance. The proposed regulation would significantly impact how companies process and protect personal data.
This document provides an overview of trends and issues from the Information Commissioner's Office (ICO), including key statistics on Data Protection Act (DPA) complaints and enforcement actions. Common data protection failures seen by the ICO include a lack of training, inadequate policies and procedures, and failure to implement appropriate technical solutions like encryption. The ICO has a range of regulatory and enforcement options, including civil monetary penalties (CMPs), with a framework that considers the seriousness, aggravating/mitigating factors, financial impact, objectives, and consistency with past cases. An example CMP of £50,000 issued to Amber UPVC Fabrications Ltd is described.
This document summarizes a legal update meeting on the EU Data Protection Regulation. The meeting agenda included presentations on the future of the EU Data Protection Regulation and how it will impact direct marketing practices. Key points from the presentations include:
- The current EU Data Protection Directive is outdated and a new Regulation is being negotiated that would impose stricter consent requirements, rights for individuals, and sanctions for non-compliance.
- Explicit consent may be required for all data processing and marketing under the new Regulation.
- Individuals may have new rights like "the right to be forgotten" and easier access to their personal data.
- Businesses need to prepare for potential fines of up to 2% of global annual turnover for violations
The document provides an overview of a data protection seminar, including:
- The agenda which covers understanding data protection law, practical tips for marketers, and a question period.
- An introduction to why data protection is important for protecting information, avoiding reputational damage, making good business sense, and avoiding enforcement actions.
- A summary of the key aspects of the Data Protection Act 1998 and Privacy and Electronic Communications Regulation 2003, including definitions, principles, and rules regarding marketing communications.
- Practical tips for marketers regarding data capture, obtaining permissions, and regaining lost permissions in compliance with regulations.
This document summarizes a legal update event held by the DMA (Direct Marketing Association) on data protection. It includes:
- An agenda for the day covering upcoming changes to EU data protection laws and their implications for direct marketing.
- A summary of proposed changes in the EU's draft Data Protection Regulation, including stricter consent requirements, increased data subject rights like the "right to be forgotten", and heavier sanctions for non-compliance.
- An analysis of how these changes may impact direct marketing practices, such as the need to obtain explicit consent, review existing databases and consent language, and increase compliance costs.
Look Before You Leap: Unauthorized Practice of the Law, Supervision of Non-La...Kevin O'Shea
Together with my (future) partner, Peter Imse, these are the slides for our June 2011 CLE presented in conjunction with the First American Title Insurance Company. The topics in these slides were revisited in my June 2014 presentation (Avoiding Technical Fouls:Selected Ethical Issues in Advertising, Social Media, and Cloud Computing). Nevertheless, there is some interesting data in this presentation that does not appear in my June 2014 slides.
The document provides an overview of the General Data Protection Regulation (GDPR). It discusses key aspects of GDPR such as what it is, who it applies to, lawful bases for processing data, data subject rights, and steps for achieving compliance. Specifically, GDPR is a new EU privacy law that gives more control to individuals over their personal data and imposes fines on companies that don't comply. It applies broadly to any organization that handles EU citizens' data.
General Data Protection Regulation for OpsKamil Rextin
A brief on GDPR & Hubspot for Marketing & Marketing Ops.
This PPT provides a brief background on GDPR & how to implement GDPR compliance with Hubspot , Facebook & Google Analytics
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumConstantine Karbaliotis
The GDPR will impact Canadian companies that do business in Europe in several ways:
1. Canadian companies will face new obligations around data protection and privacy to comply with the GDPR, including requirements for obtaining consent from individuals and providing certain privacy rights.
2. The GDPR may impact Canada's status as having adequate privacy laws as determined by European regulators. Canada's privacy laws may need to be strengthened to maintain this status and allow for continued data transfers between Europe and Canada.
3. Canadian companies will need to analyze how the GDPR's new requirements around areas like data breaches, international transfers, and individual rights will operationally impact their business practices and data handling. They may need to make changes to
These slides explore the reforms to the UK General Data Protection Regulation (GDPR) proposed by the UK Government in Data: A New Direction. It is argued that they are both significant and unbalanced against the data subject but (aside potentially from the e-privacy rules) not generally radical. The great bulk of the proposed substantive changes to data protection could plausibly be justified under the derogation clauses available to EU Member States within the GDPR itself. Reforms to the integrity duties of controllers and others are more far-reaching. Nevertheless, their broad structure remains compatible with even the revised version of the Council of Europe framework, Data Protection Convention 108+, which both the EU and UK remain strongly committed to. Finally, the proposals to shift ICO supervision de jure away from a priority focus on individual data subject rights and complaints are difficult to square even with Convention 108+. Nevertheless, de facto the ICO far from acts as a legal champion for the data subject today. Indeed, despite receiving over 36,000 complaints from individuals during 2020-21, it issued just three fines under the GDPR (all concerning data security breaches) and just one injunctive enforcement notice.
EU General Data Protection: Implications for Smart Meteringnuances
This presentation provides the reader with an insight into the politics of EU Data protection as well as an overview of the key stakeholders. We focus on the implication for the smart metering industry.
The Information Commissioner calls - what to expect and how to react, May 201...Browne Jacobson LLP
This workshop covered ICO investigations into breaches of the current Data Protection Act 1998 and the Privacy and Electronic Communications Regulations 2003 (as amended).
We covered the following topics:
- the ICO’s powers, procedures and policies
- recent cases and ICO priorities
- your rights and obligations
- the benefits and pitfalls of proactive breach notification
- areas of risk and how to address them
- protecting legal privilege
- managing the risks under the Freedom of Information Act, and
- the major changes brought in by the forthcoming General Data Protection Regulation.
The GDPR will directly apply across the EU from May 2018, replacing the previous data protection directive. It expands the scope of regulations and increases accountability for organizations. Individual rights are also enhanced, including rights to access, rectify, and erase personal data. Non-compliance can result in fines of up to 20 million euros or 4% of annual global turnover. Organizations should begin compliance projects now to assess risks, strengthen policies, and appoint data protection officers. The GDPR aims to harmonize data protection and modernize rules for an increasingly digital world.
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsAnitafin
This is the presentation from the class I taught at the University of Toronto Faculty of Information Sciences graduate school - a major challenge to capture the concepts in less than 3 hours!
General Data Protection Regulation: what do you need to do to get prepared? -...IISPEastMids
At our Spring East Midlands Cyber Security event on the Impact of the General Data Protection Regulation, Helena Wootton looks at the things you need to do to get prepared for the new data protection regulation.
http://qonex.com/east-midlands-cyber-security-forum/
New General Data Protection Regulation (Agnes Andersson Hammarstrand)Nordic APIs
This is a session given by Agnes Andersson Hammarstrand at Nordic APIs 2016 Platform Summit on October 25th, in Stockholm Sweden.
Description:
This spring a new EU General Data Protection Regulation was adopted to replace the current personal data legislations. Companies that break the rules risk fines of up to 4 % of the worldwide group turnover. The new regulations entail a large number of news that all companies should be informed about. Among other things, IT systems need to be adapted to privacy under the principles of privacy by design.
Agnes Hammarstrand, partner at Delphi Law firm and expert within IT and online provides an introduction to the new regulations and what you need to do.
The EU Data Protection Regulation - what you need to knowSophos Benelux
De komende EU Data Beschermingsregulering vraagt van organisaties wereldwijd dat zij de data beveiligen die zij beheren en bezitten van Europese burgers. Het is algemeen aanvaard dat encryptie de beste methode is om te voldoen aan deze nieuwe regulering. Wanneer een lek ontstaat en u kunt aantonen dat alle persoonlijke data was versleuteld, verkleint de kans aanzienlijk dat u vanuit de EU een boete ontvangt.
Veel organisaties hebben geen idee wat deze nieuwe regulering inhoudt of hoe zij zich moeten voorbereiden op deze nieuwe regels. Behoort uw organisatie ook tot deze groep?
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...TrustArc
We outline the proposed changes in the EU General Data Protection Regulation (GDPR) and its effect on the privacy of US-EU Data transfers.
Access the complete webinar on how the EU GDPR will affect your business https://info.truste.com/lp/truste/On-Demand-Webinar-Reg-Page.html?asset=J68IQUDK-565
This is a slightly modified version of a presentation that I gave to fellow lawyers last week. It explains what GDPR is, the policy of data protection and the evolution of data protection legislation from the OECD Guidelines and Council of Europe Convention to the GDPR. It explores the regulation focusing on the data protection principles and, in particular, the lawfulness requirement and the validity of consent. The presentation mentions the Law enforcement data protection directive, the Data Protection Bill and the arrangements post Brexit. Finally, it considers the preparations recommended by the Information Commissioner for small busiesses
EU GDPR(general data protection regulation)RAKESH S
The document discusses the key aspects and requirements of the European Union's General Data Protection Regulation (GDPR) which takes effect in May 2018. It overviews the goals of the GDPR to give citizens control over their personal data and simplify regulations for international business. Some key points covered include territorial scope and application to non-EU organizations, data subject rights, security breach notification requirements, appointing a data protection officer, and strategies for implementing GDPR compliance.
CEE CMS Data Protection webinar series - Part 2CMSLondon
This document summarizes a webinar on data protection held on April 2nd, 2014. It covered several topics: demystifying big data and the privacy issues it raises; ensuring cookie compliance; rules around security breaches; hot topics in workplace privacy like bring your own device policies and whistleblowing; and an overview of the draft EU Data Protection Regulation. The webinar provided guidance on these issues and emphasized the need for organizations to review their policies and practices to ensure compliance. It also noted ongoing negotiations around the EU regulation and implications for the future of data protection.
Discussion of the main elements of the draft Data Protection Regulation: what difference will it make to industry practice and user rights to control their data?
The document outlines an action plan to implement professional learning communities (PLCs) among teachers at Hurst Hills Elementary to improve student achievement. The plan includes 7 action steps: 1) meeting with administrators to discuss the topic, 2) analyzing student achievement data to identify areas for improvement, 3) developing binders on PLCs for teachers, 4) providing training to teachers on PLCs, 5) having teachers set student achievement goals, 6) having monthly PLC meetings to track progress, and 7) evaluating PLC effectiveness by comparing student performance before and after implementation.
This document summarizes the key findings of a survey conducted by Vocus and Brian Solis on perceptions of online influence. Over 700 marketing and communications professionals were surveyed from August to September 2010. The survey found that while influence is seen as different from popularity, there is a correlation between reach and influence. Quality of network, quality of content, and ability to drive measurable outcomes were seen as the top factors that make someone influential. When asked who would have more influence, respondents chose someone with a smaller but tightly connected network over those with larger but loosely connected networks. The survey also found that creating compelling content was seen as the most important way to build influence online. There was no consensus on how to best measure influence in social media.
Magnolia Elementary School (MES) underwent a self-assessment of its technology integration using the School Technology and Readiness (STaR) tool over three years from 2006 to 2008. MES showed growth each year, with its overall rating advancing from "Developing" in 2006 and 2007 to "Advance" in 2008. While MES made progress in all areas measured by STaR, including Teaching and Learning, Educator Preparation, Leadership, and Infrastructure, there remains opportunity for continued growth.
Massaging the scalp with oil can increase hair growth by inducing friction and increased blood flow, not through the oil itself. Most people shed 50-100 hairs per day which is normal, and hair loss does not mean permanent hair loss as new hairs replace shed hairs. Cutting hair regularly will not affect growth rate, which is about half an inch per month. Androgenetic alopecia is a genetic form of hair loss that affects both men and women, causing a receding hairline and thinning hair. Platelet rich plasma therapy is a non-surgical treatment that uses a person's own platelets to promote hair growth by stimulating the follicles.
The document provides an overview of the General Data Protection Regulation (GDPR). It discusses key aspects of GDPR such as what it is, who it applies to, lawful bases for processing data, data subject rights, and steps for achieving compliance. Specifically, GDPR is a new EU privacy law that gives more control to individuals over their personal data and imposes fines on companies that don't comply. It applies broadly to any organization that handles EU citizens' data.
General Data Protection Regulation for OpsKamil Rextin
A brief on GDPR & Hubspot for Marketing & Marketing Ops.
This PPT provides a brief background on GDPR & how to implement GDPR compliance with Hubspot , Facebook & Google Analytics
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumConstantine Karbaliotis
The GDPR will impact Canadian companies that do business in Europe in several ways:
1. Canadian companies will face new obligations around data protection and privacy to comply with the GDPR, including requirements for obtaining consent from individuals and providing certain privacy rights.
2. The GDPR may impact Canada's status as having adequate privacy laws as determined by European regulators. Canada's privacy laws may need to be strengthened to maintain this status and allow for continued data transfers between Europe and Canada.
3. Canadian companies will need to analyze how the GDPR's new requirements around areas like data breaches, international transfers, and individual rights will operationally impact their business practices and data handling. They may need to make changes to
These slides explore the reforms to the UK General Data Protection Regulation (GDPR) proposed by the UK Government in Data: A New Direction. It is argued that they are both significant and unbalanced against the data subject but (aside potentially from the e-privacy rules) not generally radical. The great bulk of the proposed substantive changes to data protection could plausibly be justified under the derogation clauses available to EU Member States within the GDPR itself. Reforms to the integrity duties of controllers and others are more far-reaching. Nevertheless, their broad structure remains compatible with even the revised version of the Council of Europe framework, Data Protection Convention 108+, which both the EU and UK remain strongly committed to. Finally, the proposals to shift ICO supervision de jure away from a priority focus on individual data subject rights and complaints are difficult to square even with Convention 108+. Nevertheless, de facto the ICO far from acts as a legal champion for the data subject today. Indeed, despite receiving over 36,000 complaints from individuals during 2020-21, it issued just three fines under the GDPR (all concerning data security breaches) and just one injunctive enforcement notice.
EU General Data Protection: Implications for Smart Meteringnuances
This presentation provides the reader with an insight into the politics of EU Data protection as well as an overview of the key stakeholders. We focus on the implication for the smart metering industry.
The Information Commissioner calls - what to expect and how to react, May 201...Browne Jacobson LLP
This workshop covered ICO investigations into breaches of the current Data Protection Act 1998 and the Privacy and Electronic Communications Regulations 2003 (as amended).
We covered the following topics:
- the ICO’s powers, procedures and policies
- recent cases and ICO priorities
- your rights and obligations
- the benefits and pitfalls of proactive breach notification
- areas of risk and how to address them
- protecting legal privilege
- managing the risks under the Freedom of Information Act, and
- the major changes brought in by the forthcoming General Data Protection Regulation.
The GDPR will directly apply across the EU from May 2018, replacing the previous data protection directive. It expands the scope of regulations and increases accountability for organizations. Individual rights are also enhanced, including rights to access, rectify, and erase personal data. Non-compliance can result in fines of up to 20 million euros or 4% of annual global turnover. Organizations should begin compliance projects now to assess risks, strengthen policies, and appoint data protection officers. The GDPR aims to harmonize data protection and modernize rules for an increasingly digital world.
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsAnitafin
This is the presentation from the class I taught at the University of Toronto Faculty of Information Sciences graduate school - a major challenge to capture the concepts in less than 3 hours!
General Data Protection Regulation: what do you need to do to get prepared? -...IISPEastMids
At our Spring East Midlands Cyber Security event on the Impact of the General Data Protection Regulation, Helena Wootton looks at the things you need to do to get prepared for the new data protection regulation.
http://qonex.com/east-midlands-cyber-security-forum/
New General Data Protection Regulation (Agnes Andersson Hammarstrand)Nordic APIs
This is a session given by Agnes Andersson Hammarstrand at Nordic APIs 2016 Platform Summit on October 25th, in Stockholm Sweden.
Description:
This spring a new EU General Data Protection Regulation was adopted to replace the current personal data legislations. Companies that break the rules risk fines of up to 4 % of the worldwide group turnover. The new regulations entail a large number of news that all companies should be informed about. Among other things, IT systems need to be adapted to privacy under the principles of privacy by design.
Agnes Hammarstrand, partner at Delphi Law firm and expert within IT and online provides an introduction to the new regulations and what you need to do.
The EU Data Protection Regulation - what you need to knowSophos Benelux
De komende EU Data Beschermingsregulering vraagt van organisaties wereldwijd dat zij de data beveiligen die zij beheren en bezitten van Europese burgers. Het is algemeen aanvaard dat encryptie de beste methode is om te voldoen aan deze nieuwe regulering. Wanneer een lek ontstaat en u kunt aantonen dat alle persoonlijke data was versleuteld, verkleint de kans aanzienlijk dat u vanuit de EU een boete ontvangt.
Veel organisaties hebben geen idee wat deze nieuwe regulering inhoudt of hoe zij zich moeten voorbereiden op deze nieuwe regels. Behoort uw organisatie ook tot deze groep?
What does the Proposed EU General Data Protection Regulation (GDPR) mean for ...TrustArc
We outline the proposed changes in the EU General Data Protection Regulation (GDPR) and its effect on the privacy of US-EU Data transfers.
Access the complete webinar on how the EU GDPR will affect your business https://info.truste.com/lp/truste/On-Demand-Webinar-Reg-Page.html?asset=J68IQUDK-565
This is a slightly modified version of a presentation that I gave to fellow lawyers last week. It explains what GDPR is, the policy of data protection and the evolution of data protection legislation from the OECD Guidelines and Council of Europe Convention to the GDPR. It explores the regulation focusing on the data protection principles and, in particular, the lawfulness requirement and the validity of consent. The presentation mentions the Law enforcement data protection directive, the Data Protection Bill and the arrangements post Brexit. Finally, it considers the preparations recommended by the Information Commissioner for small busiesses
EU GDPR(general data protection regulation)RAKESH S
The document discusses the key aspects and requirements of the European Union's General Data Protection Regulation (GDPR) which takes effect in May 2018. It overviews the goals of the GDPR to give citizens control over their personal data and simplify regulations for international business. Some key points covered include territorial scope and application to non-EU organizations, data subject rights, security breach notification requirements, appointing a data protection officer, and strategies for implementing GDPR compliance.
CEE CMS Data Protection webinar series - Part 2CMSLondon
This document summarizes a webinar on data protection held on April 2nd, 2014. It covered several topics: demystifying big data and the privacy issues it raises; ensuring cookie compliance; rules around security breaches; hot topics in workplace privacy like bring your own device policies and whistleblowing; and an overview of the draft EU Data Protection Regulation. The webinar provided guidance on these issues and emphasized the need for organizations to review their policies and practices to ensure compliance. It also noted ongoing negotiations around the EU regulation and implications for the future of data protection.
Discussion of the main elements of the draft Data Protection Regulation: what difference will it make to industry practice and user rights to control their data?
The document outlines an action plan to implement professional learning communities (PLCs) among teachers at Hurst Hills Elementary to improve student achievement. The plan includes 7 action steps: 1) meeting with administrators to discuss the topic, 2) analyzing student achievement data to identify areas for improvement, 3) developing binders on PLCs for teachers, 4) providing training to teachers on PLCs, 5) having teachers set student achievement goals, 6) having monthly PLC meetings to track progress, and 7) evaluating PLC effectiveness by comparing student performance before and after implementation.
This document summarizes the key findings of a survey conducted by Vocus and Brian Solis on perceptions of online influence. Over 700 marketing and communications professionals were surveyed from August to September 2010. The survey found that while influence is seen as different from popularity, there is a correlation between reach and influence. Quality of network, quality of content, and ability to drive measurable outcomes were seen as the top factors that make someone influential. When asked who would have more influence, respondents chose someone with a smaller but tightly connected network over those with larger but loosely connected networks. The survey also found that creating compelling content was seen as the most important way to build influence online. There was no consensus on how to best measure influence in social media.
Magnolia Elementary School (MES) underwent a self-assessment of its technology integration using the School Technology and Readiness (STaR) tool over three years from 2006 to 2008. MES showed growth each year, with its overall rating advancing from "Developing" in 2006 and 2007 to "Advance" in 2008. While MES made progress in all areas measured by STaR, including Teaching and Learning, Educator Preparation, Leadership, and Infrastructure, there remains opportunity for continued growth.
Massaging the scalp with oil can increase hair growth by inducing friction and increased blood flow, not through the oil itself. Most people shed 50-100 hairs per day which is normal, and hair loss does not mean permanent hair loss as new hairs replace shed hairs. Cutting hair regularly will not affect growth rate, which is about half an inch per month. Androgenetic alopecia is a genetic form of hair loss that affects both men and women, causing a receding hairline and thinning hair. Platelet rich plasma therapy is a non-surgical treatment that uses a person's own platelets to promote hair growth by stimulating the follicles.
Win More with Embedded Dashboards & ReportingLogiXML
This document discusses how embedding reporting capabilities using LogiXML's Express Metrix product can help software companies speed development, improve the end user experience, and increase sales. It provides an example of how Express Metrix was implemented by Express Software Manager to modernize their reporting, reducing development time and improving demos which increased win rates and shortened sales cycles. LogiXML offers pre-built reporting elements that streamline embedded reporting development.
The document discusses the key topics around big data and data protection that were covered at a legal update event, including:
1) How the principles of data protection (such as fair processing, data minimization, and security) apply to big data, which can involve large and varied datasets.
2) Issues around obtaining valid consent for big data uses or relying on legitimate interests, as well as complying with the data retention principle.
3) How the research exemption may apply to some big data activities for commercial purposes like market research.
4) Potential impacts of the proposed EU Data Protection Regulation on big data, such as strengthened individual rights and compliance obligations for organizations.
The document discusses conventions of real film magazines and how the author's mock magazine both uses, develops, and challenges some of those conventions. It provides examples of how the author's magazine uses conventions like color schemes and banner placement. It also notes ways it develops conventions, such as adding a QR code. And it challenges conventions by placing the main image at an angle and mixing stylistic elements from different magazines.
This document summarizes a meeting that discussed European legal and privacy updates for data-driven marketing. It included presentations from the CEO of DMA Group and the co-chair of FEDMA on different privacy views in Europe and the need for proportionate and effective regulation through dialogue between industry and policymakers. Other topics discussed were the Data Protection Regulation's impact and how to prepare for the new law, including assessing what constitutes personal data, consent mechanisms, legitimate interest, and profiling activities. The future of marketing and why the industry should care about developments in Europe were also mentioned.
This document provides an agenda and details for a workshop on preparing entries for the DMA Awards. The workshop covers best practices for presenting creative work, strategy, and results in award submissions. Speakers will discuss how to effectively showcase strategy, creative, and results, as well as tips for choosing appropriate categories and the judging process. Attendees are encouraged to enter their work and take advantage of the opportunity for recognition, business development, and to showcase their marketing excellence.
These are the presentation slides from the DMA's first innovation summit on 14 November. See more information here http://www.dma.org.uk/content/fear-faith-and-fortune-innovation-summit
Autism spectrum disorder is a neurodevelopmental condition characterized by difficulties with social interaction and communication, as well as restrictive and repetitive behaviors. It affects areas of the brain related to social skills, language, and flexibility. While the exact causes are unknown, genetic and environmental factors may play a role. Symptoms can range from mild to severe and vary by individual. Research is ongoing to better understand the condition and how the autistic brain differs from others. This course helped the student gain a deeper understanding of autism to better help patients.
Post-Traumatic Stress Disorder (PTSD) can affect all aspects of a person's life due to trauma exposure. PTSD symptoms include flashbacks, nightmares, avoidance, emotional issues, anger, hypervigilance, anxiety, and dissociation. While substance abuse and emotional numbing are negative coping mechanisms, treatment can help people cope with PTSD.
Howard Carter's discovery of Tutankhamen's tomb was one of the greatest archaeological finds ever because it was untouched, containing a wealth of artifacts and treasures. Carter studied the Valley of the Kings for years and eventually located the tomb, taking months to fully excavate through multiple plaster walls. The untouched tomb provided invaluable insights into ancient Egyptian culture and beliefs about the afterlife, filled with artifacts reflecting Tutankhamen's life that Egyptians placed in tombs to accompany them.
The Value of Agile BI in Analyzing Mission-Critical Healthcare InfoLogiXML
The document discusses how the Blood Centers of America (BCA) uses an agile business intelligence (BI) solution from LogiXML to analyze critical healthcare data and improve operations. The BI solution provides a collaborative dashboard that gives BCA's 36 member blood centers real-time metrics and analytics to better match blood supply and demand, enhance collaboration, and improve overall performance with limited resources. The dashboard has helped increase blood collection productivity and lower operational costs for BCA and its member centers.
An Introduction to Data Protection (London) - June 2015Rachel Aldighieri
The document summarizes a presentation on data protection laws given by Janine Paterson. It covered why data protection is important, key terms in data protection law like personal data and sensitive personal data, the 8 principles of the Data Protection Act 1998, and key rules of the Privacy and Electronic Communications Regulation 2003. It provided practical tips for marketers on topics like obtaining consent, sourcing and updating data, and regaining lost permissions.
GDPR – what does it mean for charities and what you need to consider - Iain P...m-hance
This document discusses the upcoming changes to data protection regulations with the introduction of the General Data Protection Regulation (GDPR) in May 2018. Some of the key changes include: (1) organizations needing active, demonstrable consent from individuals to process their personal data; (2) increased accountability requirements where organizations must show how they comply with data protection principles; (3) potential fines of up to 4% of annual global turnover or 20 million euros for noncompliance. The presentation provides an overview of these and other changes organizations should prepare for under the GDPR regarding users' rights, data governance, privacy by design, and working with data processors.
Getting to grips with General Data Protection Regulation (GDPR)Zoodikers
Leading employment lawyer Pam Loch, and digital expert Katie King share their advice on how to get to grips with the topic of the moment - GDPR.
They look at who is liable, the impact of Brexit, how it affects marketing and what steps you can take to prepare.
The document discusses the transition from the Data Protection Act 1998 to the new General Data Protection Regulation (GDPR) that takes effect in May 2018. Some key points include:
- The GDPR has a wider territorial scope and applies to any organization that offers goods/services to individuals in the EU or monitors their behavior.
- Organizations must comply with new requirements for lawful processing of personal data, rights of data subjects, data protection officers, security breaches, and accountability.
- Non-compliance will result in significant fines of up to 20 million euros or 4% of global annual turnover, focusing minds on implementing a GDPR compliance strategy by the May 2018 deadline.
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Brian Miller, Solicitor
In a more detailed look at data protection, Vicki Bowles takes a look at the new draft EU Data Protection Regulation, disclosure and BYOD (Bring Your Own Device).
Brian Miller then covers ISO certification, how to check whether your vendor’s systems are secure, how US Safe Harbor worked in practice, how it will do so with the new Privacy Shield and the various certification/accreditation systems for cloud computing vendors.
The document discusses key aspects of preparing for and complying with the EU General Data Protection Regulation (GDPR), which goes into effect on May 25, 2018. It outlines some of the major changes and requirements introduced by the GDPR, including its expanded territorial reach, new obligations for data processors, strengthened consent requirements, increased penalties for non-compliance, and the role of supervisory authorities. The document emphasizes that organizations must conduct assessments, secure resources and budgets, and implement technologies and processes to ensure they have a defensible position and are prepared to address the challenges and opportunities created by the GDPR.
Introduction to EU General Data Protection Regulation: Planning, Implementat...Financial Poise
The GDPR changed the way the world collects, stores, and sends personal data. The GDPR is a broad EU regulation that requires businesses to protect the personal data of EU citizens, whether the business itself is in the EU or elsewhere. Since its implementation in 2018, companies that collect data on EU citizens must comply with strict rules for the protection of personal data or face heavy fines for non-compliance. This webinar will provide an overview of GDPR’s applicability and requirements, as well as how your organization may meet those standards.
Introduction to EU General Data Protection Regulation: Planning, Implementati...Financial Poise
The GDPR changed the way the world collects, stores, and sends personal data.The GDPR is a broad EU regulation that requires businesses to protect the personal data of EU citizens, whether the business itself is in the EU or elsewhere. Since its implementation in 2018, companies that collect data on EU citizens must comply with strict rules for the protection of personal data or face heavy fines for non-compliance. This webinar will provide an overview of GDPR’s applicability and requirements, as well as how your organization may meet those standards.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-eu-general-data-protection-regulation-planning-implementation-and-compliance-2021/
This document provides an overview of Polar's approach to complying with the General Data Protection Regulation (GDPR). It discusses Polar's commitment to privacy, what GDPR is, some of the key challenges of implementation, and the processes and reviews Polar has put in place. The director introduces himself and his role at Polar, and then covers key aspects of GDPR including data subject rights, the definitions of controllers and processors, lawful bases for processing, and requirements around consent, documentation, accountability, and security.
Presentatie Giorgos Rossides, Europese CommissieEuropadialoog
The document discusses the need to update EU data protection rules for the 21st century due to new challenges from globalization and technologies. It notes problems citizens face with insufficient control over their personal data online and difficulties exercising their data rights. It also discusses problems businesses face from fragmented rules and inconsistent enforcement across EU states. The main proposed changes under the new regulation aim to put citizens in control of their data and establish consistent rules to create a digital single market while strengthening enforcement.
MyComplianceOffice presents our Oct 26th webinar, “ Prepare Your Firm for GDPR", co-hosted by MCO and Emily Mahoney a Technology Lawyer at Mason Hayes & Curran
Data protection janine paterson - direct marketing associationiof_events
The document summarizes key points about data protection laws and how they apply to marketing. It discusses the Data Protection Act of 1998, the 8 principles of processing personal data, requirements for obtaining consent for marketing, and challenges of obtaining opt-ins from existing customers. It also notes potential changes coming from a proposed new European Data Protection Regulation that would strengthen requirements around consent and notification of data breaches.
Mind Your Business: Why Privacy Matters to the Successful EnterpriseEric Kavanagh
The Briefing Room with Dr. Robin Bloor and HPE Security
There's no such thing as bad publicity? In the era of data breaches, that's not really true. Time and again in recent years, the mighty have fallen. And as sensitive data reaches the hands of bad guys the world over, so go the fates of customers and companies alike. That's why security is the fastest growing sector of enterprise IT today, with privacy issues front and center.
Register for this episode of The Briefing Room to hear veteran Analyst Dr. Robin Bloor explain why companies need to pay serious attention to the ever-growing importance of privacy, not just security. He'll be briefed by Jay Irwin of Teradata and Carole Murphy of HPE Security, who will demonstrate how their technologies can be combined to create a robust privacy infrastructure that allows organizations to avoid data breaches, or at least keep the data encrypted, thus avoiding the damage of a breach.
Social business software is all about sharing content and data in a “collaborative” way to identify internal or external experts. Most of these data must be considered as personal data which is related to an individual person.
Implementing social business technologies in enterprises often leads to discussion with data protection supervisors how to be compliant with EU data protection law. This discussion gets even more challenging if you consider using social business applications in “the cloud” which might the only choice in the near future due IBMs “Cloud First” or Microsoft’s “Cloud only” delivery model.
This session will give you an overview
- about EU data protection regulations
- its implications for using social business systems
- special considerations for using cloud based social business systems
The document summarizes the key changes between the Data Protection Act and the new General Data Protection Regulation (GDPR) that takes effect in 2018. Some of the major changes include stricter consent requirements, increased accountability and governance responsibilities, larger fines for noncompliance, and new data subject rights around access, erasure, and portability. It recommends organizations form working groups, obtain specialist knowledge, and get certified to ensure compliance with the GDPR before enforcement begins in 2018.
Domain management and brand protection in the era of the EU's GDPRBartLieben
Overview on how the General Data Protection Regulation clashes with ICANN's obligations imposed upon registries and registrars to have a publicly accessible WHOIS
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
The European Union’s proposed new data protection regulation aims to update Europe’s data protection laws and to provide a more consistent data protection framework across the Continent.
But the new regulation, which replaces the EU’s existing data protection directive and member states’ data protection laws, will put some new demands on organisations holding personal data. Breach disclosure and “the right to be forgotten” will force businesses to update their data protection and retention policies.
This presentation will:
- Review the current EU laws, and contrast them with laws in other parts of the world;
- Examine the arguments for strengthening data protection in Europe, and the likely outcomes;
- Look at what security teams should already be doing to put themselves ahead of legislative changes;
- Outline strategies and technologies organisations need to meet current and future data protection requirements
- Help infosecurity teams to explain the changes – and their consequences – to their boards
Everything you need to know about the GDPRSpoon London
The frequency of data-related incidents could change with the impending General Data Protection Regulation (GDPR) – the EU’s law that comes into effect in May. The major update to the previous EU data protection law aims to regulate the use and treatment of an individual’s personal data.
A new regulation means organisations that use data will need to be more careful and explicit with gaining consent. After May, companies that maintain poor data protection practices will not only be breaking the law, but could face a hefty €20 million fine or four per cent of a company’s annual turnover.
Needless to say, the GDPR is a pretty big deal with even bigger consequences. Still, no need to panic. Here's everything you need to know about the GDPR.
Similar to DMA Legal update: autumn 2013 - Tuesday 1 October (20)
This document outlines the agenda for a conference on navigating B2B marketing and insights into marketing automation. The agenda includes presentations on the topics of focusing on technology over content, evaluating content quality, considerations for marketing automation implementations, and a panel discussion. Presenters will discuss lessons learned, common challenges with marketing automation projects, and strategies for overcoming barriers between marketing, sales, and IT departments. The event aims to provide reflections on marketing automation and collaborative marketing applications from industry experts.
Taking the lead: customer acquisition barometer 2015Rachel Aldighieri
This document summarizes a presentation on customer acquisition strategies. It discusses key findings from research on how consumers prefer to be contacted by companies compared to how marketers currently engage consumers. There is a preference gap shown between these two. The presentation also shares results from a fantasy football marketing campaign that engaged fans by tapping into the insight that many fans will select players for their fantasy team that are not actually on the real team they support. This campaign helped drive significant growth in registrations and engagement through leveraging an understanding of fan behaviors. The document concludes with a panel discussion on effective acquisition strategies.
The value of mail: what planners and marketers need to knowRachel Aldighieri
This document appears to be a presentation on the value of direct mail from Royal Mail MarketReach. It summarizes the key points as:
1) Direct mail provides valuable access to time and place, allowing messages to reach consumers when and where they are most receptive.
2) Great creative that defines a brand can give commercial advantage to direct mail over other channels.
3) Integration of direct mail with other channels, such as TV, can significantly increase campaign effectiveness and drive consumers along purchase journeys.
The document outlines a social media event held by DMA House on sharpening social media skills. It includes an agenda for the day with presentations on keeping social media campaigns legal, maximizing engagement, analyzing social media data, and a panel discussion. One presentation provides details on legal requirements for social media marketing under the CAP Code and CPRs, and highlights recent cases related to promotions, endorsements, and third-party content. Another presentation discusses best practices for understanding audiences, objectives, channels and using search and SEO to improve engagement.
Stop selling and start serving: how to bring data, creativity and technology ...Rachel Aldighieri
The document summarizes key points from a conference on combining data, creativity and technology. It discusses how understanding customer journeys is important to provide personalized experiences across interactions. It notes businesses often provide disjointed and impersonal experiences. A presentation discusses recognizing anonymous customers, understanding their journeys through different interactions, and continuing conversations across channels. Another talk outlines finding the "data and creative sweet spot" by using data inputs up front as a springboard for creative ideas while allowing freedom in execution. The document concludes with closing comments from the conference chair.
The document summarizes the FEDMA Legal Fact Pack 2015, which provides information on direct marketing laws for 31 countries. It contains country fact sheets on rules for direct mail, email, telemarketing, and data protection. The fact pack is an important resource for direct marketers to understand legal requirements and promote ethical practices. FEDMA publishes the fact pack to help direct marketers comply with regulations and develop self-regulation standards for the industry.
This document provides an agenda and overview for an event on best practices for presenting creative work, strategy, and results for the DMA Awards. The event will include presentations on how to effectively showcase creative work, strategy, and results. It will also cover which award categories to consider entering and provide an overview of the judging process. The goal is to help attendees develop strong award submissions that represent their best work in the most favorable light.
The document discusses the state of British copywriting based on the perspective of Mark Runacus, chair of the DMA Awards committee. It notes the large volume and quality of entries in recent DMA Awards. It then outlines a census of writers to understand their views on their work and industry. Writers expressed that they enjoy their work but fear for the future due to issues like clients and new technology. The document criticizes how the industry has abandoned copywriting in favor of "marketing-speak" and lack of character or message in writing. It encourages writers to have an interesting message rather than "shut the fuck up" if they have nothing to say.
Data detailed: how to buy and sell information responsibly - 08.07.2015Rachel Aldighieri
This document summarizes an event about responsible data practices in buying and selling information. The agenda includes welcome remarks, presentations on data challenges and managing the data value chain, and a client's perspective on buying data. A panel discussion follows with representatives from the Direct Marketing Commission, Opt-4, DataTalk, and Barclays Bank. The event concludes with closing comments.
Data privacy: what the consumer really thinks - 30.06.2015Rachel Aldighieri
This document summarizes a conference on data privacy held by the DMA UK. The agenda includes welcome remarks, presentations on research into consumer attitudes towards data privacy and case studies. A panel discussion will be held with representatives from Acxiom, Future Foundation, Wunderman, and Time Inc. discussing topics like the trends in how consumers view data sharing and incentives for sharing data. The conference aims to explore how consumer views on privacy are evolving and discuss how companies can build trust with consumers in an age of increased awareness of data use.
An introduction to data protection - Manchester - 24/06/15Rachel Aldighieri
This document provides an agenda and overview for a data protection seminar. It discusses:
1. Why data protection is important for protecting information, avoiding reputational damage, and avoiding legal penalties.
2. An overview of the key UK data protection laws: the Data Protection Act 1998 and the Privacy and Electronic Communications Regulation 2003. It defines important terms, outlines the 8 data protection principles, and reviews key rules around electronic communications.
3. Practical tips for marketers on capturing data, obtaining permissions, sourcing data from third parties, and regaining lost consent.
Introduction to data protection - Edinburgh - 29/04/15Rachel Aldighieri
This document provides an overview of a data protection seminar. It discusses:
1. Why data protection is important for protecting information, avoiding reputational damage, and avoiding legal penalties.
2. Key aspects of the UK's Data Protection Act (1998) and Privacy and Electronic Communications Regulation (2003) including definitions, principles, and rules regarding electronic communications.
3. Practical tips for marketers regarding obtaining consent, maintaining marketing permissions, sourcing data, and regaining lost consent.
In search of the perfect customer journey - ManchesterRachel Aldighieri
This document summarizes a conference on mapping the customer journey in a multi-channel world. It discusses 3 key learnings: 1) examine customer journeys from the customer's perspective, 2) build journeys around emotional needs, and 3) ensure accountability for customer experience. It also notes that customer behavior has changed and journeys must reflect complex, multi-channel behavior. Successful companies bust silos, measure what matters, consider their people, and lead with their brand and customer.
This document profiles four individuals: Simon Gill, Chief Creative Officer at DigitasLBi; David Meikle, Founding Partner at Redsalt; Tim Lindsay, Chief Executive Officer at D&AD; and Mark Hancock, Planning Director at The Real Adventure Unlimited. It also discusses Rick Pullan, Managing Director at TBDA, and his work on adding maths to creative measurement to prove the value of creativity and measuring its effect on profitability. The document presents checklists on good practice guidelines, roles and responsibilities of key players, and conditions for success in measuring the business value of creativity.
This document discusses rethinking return on investment (ROI) for marketing strategies. It provides examples of ROI from past campaigns, with the highest ROI coming from optimization efforts. The document advocates investing in creativity as a catalyst for investment, noting that failure can provide valuable information. It introduces the concept of "return on innovation" and outlines a process involving exploration, creation, realization and graduation gates for assessing innovative ideas.
Mark Hancock, Planning Director, The Real Adventure Unlimited...Rachel Aldighieri
The document discusses creativity and the value of ideas. It notes that ideas come from finding relationships between facts through hard work and techniques. Good ideas can be identified by the "AHA moment" of sudden understanding. Ideas have been shown to deliver significant financial returns through increased sales. Historically, ideas were supported through patronage which allowed for risk taking. Procurement processes that overemphasize cost cutting can potentially limit creative risk taking and idea generation.
This document summarizes information from the D&AD (Design and Art Direction) organization. It provides statistics on the number of entries and jurors for the D&AD awards. It also lists the categories of communication works entered and compares the number of entries from 2014 to 2013. Additionally, it summarizes details on the winners in the Direct category for 2014 and 2013, including the number of Black Pencils, Yellow Pencils, and Nominations awarded. The document concludes by questioning whether D&AD does enough to inspire and celebrate excellence in direct advertising and how it could potentially do more.
The document discusses the relationship between marketing, procurement, and agencies and how they each determine agency value. It notes that agencies need growth and client retention while clients and procurement focus on cost reduction and measurable outcomes. The document then discusses a story about stress and how responsibility and control need to exist together. Finally, it covers client relationships and how both clients and agencies need to find the right balance of client control and agency responsibility to maximize ROI.
Thinking inside the box data permission strategies - Wednesday 18 NovemberRachel Aldighieri
The document appears to be an agenda for an event on data permission strategies. It includes sessions on the importance of incentives for consumers to opt-in to communications, how trusted brands can use big data, and marketing permissions in an omni-channel world. There will be presentations from directors at Opt-4, the Guardian News & Media, and the John Lewis Partnership, followed by a panel discussion and closing comments.
Thinking inside the box: data permission strategies - 18 NovemberRachel Aldighieri
The document appears to be an agenda for an event on data permission strategies. It includes sessions on the importance of incentives for consumers to opt-in to communications, how trusted brands can use consumer data, and managing permissions in an omni-channel world. There is also a panel discussion with representatives from Opt-4, the Guardian, John Lewis Partnership, and Telefonica UK.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Securing your Kubernetes cluster_ a step-by-step guide to success !
DMA Legal update: autumn 2013 - Tuesday 1 October
1. Data protection 2013
Friday 8 February
#dmadata
Supported by
DMA Legal update: autumn 2013
Tuesday 1 October
#dmalegal
2. 8.30am - Registration and breakfast
9.00am - Welcome
9.05am - Data Protection Regulation
The current position, potential changes and the impact on the industry
James Milligan, Solicitor, DMA
Sue Gold, Partner, Osborne Clarke
9.55am - Questions
10.05am - Round up
Consumer rights bill and consumer rights directive
Janine Paterson, Solicitor, DMA
10.35am - Questions
11.00am - Close
Agenda
3. EU Draft Data
Protection Regulation
The current position, potential
changes and the impact on the
industry
Sue Gold, Partner, Osborne Clarke
James Milligan, Solicitor, DMA
4. Impact of the new Data Protection
Regulation – Why now?
• Data Protection Directive 95/46/EC ("Directive") (implemented
in UK by 1998 Data Protection Act) showing its age
• New technologies and more complex information networks
• Lack of common European law and differences in national
implementation
• Consumer concern over privacy
• Data protection now a fundamental right under EU Charter of
Fundamental Rights
4
5. EU data protection reform
timeline
• Jan 2012 -first draft Data Protection Regulation ("DPR")
• December 2012-amendments suggested by the
Rapporteur of EC Committee on Civil Liberties, Justice and
Home Affairs ("LIBE Report")
• February – May 2013 – Reported that 4000 amendments
tabled
• May 2013- partial "compromise" draft from EU Council (
"CD" )
• October 2013 -LIBE votes on amendments
• November-December 2013 (?) –"trilogue" negotiations
between EC, Council of Ministers and Euro MPs
• March 2014 (?) -plenary vote (1st reading)
• Spring 2016 (?) - in force
5
6. 6
6
Changes proposed by the European
Parliament to the draft Data Protection
Regulation (LIBE Report)
• The European Parliament published a Draft Report dated 17
December on 8 January 2013 and supplemental changes on 9
January 2013. 350 changes are proposed in 215 page report
• Delegated Acts – the number of delegated acts has been
reduced and are either covered in the Regulation or the
European Data Protection Board can specify
• Lead Authority – the one stop shop concept has been limited
in scope and appears to merely appoint a lead authority as the
single point of contact
7. The "compromise draft" agreed by
EU Justice Ministers 31 May 2013
• "More business friendly" compromise draft ("CD") is only
partial: Chapters I-IV
• More changes to Chapters I-IV may be needed once the
remainder has been updated
• Regulation or Directive? – wording proposed allows for
Regulation to be transformed into a Directive (supported by
8 member states)
• CD already criticised by Commissioner Reding, France and
Germany as a backward step
7
8. Headline proposed changes
• Expanded definitions: “personal data” and “data subject”
• Explicit consent required
• Right to be forgotten
• Greater emphasis on accountability
• Notification of data security breaches
• More onerous sanctions for breach
• Data processors directly covered
9. Consent
Consent: Current Position Consent: Proposed Position
- Freely given, specific,
informed indication of the
data subject’s wishes
- Explicit consent required
for sensitive personal data
only
-Freely given, specific, informed and
explicit indication of data subject’s
wishes
-Given either by a statement or a
clear affirmative action
- Data controller / data subject
relationship to be taken into
account
- Burden of proof on controller to
demonstrate consent
10. Introduction of opt-in/explicit consent
• Review language used at point of data collection to ensure
that consent is explicit /opt-in
• Do people understand what they are agreeing to? – nation
of liars
• Think about how you will update legacy databases
• Children – consent wording for under 13’s if offering them
an information society service
11. Key points in the draft Regulation
IP addresses and cookies
• Definition of personal data extended so could cover some
IP addresses and cookies as “online identifiers”
• But IP addresses identify a device not an individual + some
IPs are general
• Huge implications for digital marketers
• Web analytics & profiling made much more difficult, if not
impossible
• Interaction with new cookie rules problematic
12. IP addresses and cookies
• Think about how you will deal with extension to Include
location data, IP addresses, cookies, online identifiers
• Pseudonymous/annonymous data – will you be able to
take advantage of exceptions?
13. Key points in the draft Regulation
The right to be forgotten
• Right for individuals to request organisations to delete any
information held on them
• Drafted with social media in mind – but goes beyond this
• Problem of information that has already been passed on to
third parties
• Possibility of misleading consumers by raising unrealistic
expectations
• Changes to current text likely
14. The right to be forgotten
• Prepare to respond to requests
• Deletion/ suppression
• Other legal requirements to keep information e.g.
accounting, tax, money-laundering
15. Key points in the draft Regulation
Data Breach notification
• Any data security breach to be notified to ICO and the
individuals concerned within 24 hours
• Report to cover:
• nature of breach
• number of data subjects
• categories of data
• proposed mitigation
• Not always obvious if there has been a breach or how
extensive it is
• Problem of notification fatigue
• No threshold level specified
16. Data security breach notification
• Introduce breach notification detection procedures
• Think about how you will notify data protection authorities
and affected individuals within whatever timescale is
agreed
• Develop/review your data breach response plan
17. Key points in the draft Regulation
Subject Access Requests (SARs)
• Data subjects to be able to request full information on data
held on them free of any charge
• Currently can levy a £10 fee – doesn’t cover cost but deters
time-wasters, frivolous or vexatious requests
• Costs organisations £50 million p.a. now to meet SARs
• Proposal that can provide data in electronic form if data
subject agrees to this
• Particular problem for financial services with mis-selling
issues and claims management firms
18. Subject Access Rights
• New Regulation may lead to increased public awareness of
rights e.g., right to request information ( Data Subject Access
Requests, Right to be forgotten)
• Plan ahead for increase in queries from clients/public
• Training for client/customer service teams
• Amend wording on privacy policies/data collection notices to
take account of new rules on profiling.
19. Key points in the draft Regulation
Compliance obligations
• Data protection obligations now shared between agencies and
clients, for example if holding client’s database
• Privacy by Design/Privacy by Default
• Appointment of DP officer (250+ employees)
• 2 year appointment
• Independent reporting to board
• Information and training
• Maintenance of documentation
• Data protection impact reports
• International transfers of data outside EEA – law would
apply to any processing of data or EU citizens
20. Compliance obligations
• Review amount of data being processed, erasure policies
and data retention policies
• Requirement to demonstrate compliance will mean more
documentation in respect of policies and procedures
• Contact centres, mailing houses, email/SMS broadcasters
will also be subject to these new obligations, especially in
respect of data security
• Review staff training in data protection.
• Appointment of a data protection officer?
• Risk- based approach to compliance and data protection
impact assessments
21. Proposed enhanced sanctions
• Up to €500k or 1% annual worldwide turnover intentional or
negligent failure to respond to subject access requests in
accordance with Regulation
• Up to €1m or 2% of annual worldwide turnover for other
compliance failures
• Depends on:-
• size of organisation involved
• nature and gravity of breach
• whether intentional or negligent
• technical and organisational measures
• previous breaches
• co-operation with ICO
22. Enhanced sanctions/fines
• Watch out if you get it wrong!
• Increase focus on compliance – board level issue
• Review internal policies and procedures
23. Key Points in the draft Regulation
Delegated Acts
• Many details to be implemented through additional delegated
legislation – some 45 Delegated Acts mentioned.
• Details will not be clear until Regulation is passed
• These areas of secondary legislation will include:
• powers to specify further procedures
• technical standards for Privacy by Design/Default
• specification of lawful processing condition
• additional responsibilities for national data protection
authorities; etc.
• European Commission taking significant powers to itself away
from the national authorities - raises serious issues of
subsidiarity and accountability
• National governments and Data Protection Authorities are
concerned
24. Cross – border issues
• Main establishment/ one- stop shop provisions
• Think about which country’s national data protection
authority will be lead regulator
• Possibility of changing country where head office is located
• Review arrangements for transfers of data outside EEA (28
Member States of EU + Iceland ,Liechtenstein, Norway)
• Global group – application to EU citizens’ personal data.
25. Impact on direct marketing
• Existing databases may not be usable: could decimate
prospect lists. Legacy data?
• No tracking data, profiling or segmentation without explicit
consent – less targeted and more generic communication?
• List broking severely restricted
• New information requirements and rights of the data
subject, e.g Right to be Forgotten
• Increased costs - £76,000 per business to comply +
possible £47 billion of lost sales in UK
26. Draft Regulation - DMA View
• DMA welcomes the Commission’s aim to reduce red tape
and simplify bureaucracy – but proposals do not achieve
that: overly strict, bureaucratic and unworkable
• Needs to be a fair balance between privacy and
legitimate business interests
• Current proposals will stifle innovation, add considerably
to business costs and place unnecessary obstacles to e-
commerce jobs growth
• Will be particularly harmful to SMEs – MoJ says
demonstrating compliance will cost £10m p.a.
• Hard to say how Commission’s estimate of 2.3 billion
euro saving to businesses was calculated
27. Ministry of Justice
• Disagrees with Commission’s 2.3bn Euro savings – burdens
imposed will far outweigh net benefits: in UK cost @ £100-
360 million
• Many unintended consequences, esp for SMEs
• Changes to consent, profiling & definition of personal data
particularly costly to industry
• Likely knock-on effects for growth in technological sector and
internet economy
• Regulatory Impact Assessment quotes DMA’s figures &
examples
• Impact on behavioural advertising
• Creates unrealistic expectations for consumers – R2BF
proposal is “unworkable”
28. Key lobbying messages
• Data is essential for economic growth
• UK has leading role in EU digital economy
• SMEs particularly affected
• Transparent and responsible use of data is a vital business
practice
• In industry’s interests to handle data with care
• Self-regulation has valid role to play
• Regulation will not stop bad players
• The proposed regulation is bad for consumers
• Would damage users’ online experience
• Danger of tick-box culture & unrealistic expectations
• Need a proportionate data regime that recognises that not all
data is the same
• Personal data, sensitive data,
anonymous/pseudonymous data
• Different levels of protection required
29. Lobbying activity
• In Brussels with key individuals in Council, Commission &
Parliament, e.g. MEPs & advisers; party groups
• In UK, Ministers in MoJ, DCMS, BIS, HM Treasury + Opposition
spokesmen
• Alliance of interests – UK Data Group, FEDMA, CBI, etc. - for
collective lobbying of Council and Parliament & lobbying directly
where there is no national DMA
• Position papers on priorities for industry + draft amendments to
text
• Research on consumer attitudes to privacy and on economic
value of the dm industry
31. Current UK ICO issues
Privacy impact assessments
Annonymisation code
Direct marketing guidance
32. Direct marketing guidance
• ICO interpretation does not change law
• Issued 9 September
• Retrospective , transitional period
• Respect consumer expectations and preferences
• Tightening up of third party consent for digital marketing
• Time limits for consent
• Proof of consent
33. Privacy Impact Assessment
• Consultation ends 5 November 2013
• Proportionate approach
• Process (identify the need, information flows, risks,
solutions, record, integrate and consult)
• Part of normal project management
• Annex 1 – PIA screening questions
• Annex 2 – PIA template
• Annex 3 – PIA and data protection principles
34. Anonymisation
• Issued 20 November 2012
• Re-identification – "motivated intruder" test and risk
assessment of future identification
• Consent – "legitimate interests"
• Spatial information e.g. postcodes –consider using
'replacement' post codes?
• But – is true anonymisation of data possible?
35. 35
Contacts
James Milligan, Solicitor, DMA
T - 020 7291 3347
james.milligan@dma.org.uk
Legal Advice Helpline
T - 020 7291 3360
legaladvice@dma.org.uk
Sue Gold, Partner, Osborne Clarke
T - 020 7105 7338
M - 07880 006 934
Sue.Gold@osborneclarke.com
37. Consumer Law and other key
issues
Janine Paterson, Solicitor, DMA
38. Consumer Rights Bill
• Published in draft in June 2013. Will not come into force until
2015.
• A major overhaul of existing consumer rights legislation –
consolidating 100+ consumer laws and introducing new
rights for consumers and businesses.
• Follows two consultations late last year by BIS on goods,
services and digital content; and the Law Commission &
Scottish Law Commission’s on unfair contract terms.
39. Consumer Rights Bill
• Basic rights not changing
• Aim to present rights and remedies in a simpler and clearer
way to make consumers better informed and empowered
• 3 parts:
• Consumer contracts for goods, digital content and
services – rights and remedies
• Unfair terms in contracts
• Miscellaneous: investigatory powers, enhanced
consumer measures, enforcement, competition, etc.
40. Consumer Rights Bill
Rights and remedies:
• To receive some money back after one failed repair to faulty
goods (or one faulty replacement)
• To have substandard services redone or receive a price
reduction
• To receive a repair or replacement of faulty digital content
such as film/music downloads, e-books and online games
• To return faulty goods within 30 days and receive a refund
• Collective redress allowing consumers and companies to
challenge anti-competitive behaviour.
41. Consumer Rights Bill
• Consolidates the law around unfair terms in contracts with
consumers.
• Fairness to be determined by taking into account:
• The subject matter
• All the circumstances existing when term was agreed
• All the other terms of contract or any other contract
on which it depends
• Various terms listed that cannot be assessed for fairness
42. The Consumer Contracts (Information,
Cancellation and Additional Payments)
Regulations 2013
• Implementation of some of the EU Consumer Rights
Directive which was passed in 2011
• In most areas, implementation will follow the Directive.
• Regulations deal with contracts between a trader and a
consumer:
– Made on-premises, ie a shop
– Made off-premises, ie at consumer’s home or place of
work, and
– Made at a distance, ie telephone or over the internet.
• Certain contracts are excluded including gambling, health
services and services of banking and insurance.
43. Three main areas
• Information
– Depending on the type of contract, the trader must
provide certain information.
– Many provisions already exist but new ones are
introduced especially around digital content, where
information on what systems or hardware is compatible
will need to be given.
• Cancellation
– consumers have 14 days to cancel off-premises and
distance contracts – double current provision
– Consumer have to return goods
– Traders can withhold refund until goods are returned
– Traders can deduct from refund where the consumer has
handled the goods more than expected.
44. Three main areas – cont.
• Hidden costs
– Consumers will have to give active consent for all
payments and the use of pre-ticked boxes for additional
charges will not be allowed
– Customer service telephone lines can only be charged at
the basic rate – premium rate lines will be banned
45. • Amendments to the 2008 regulations to allow consumers
who have been victims of misleading or aggressive practices
to seek redress. Covers three types of contract:
– Sale or supply of a product to a consumer by a trader;
– Sale or supply of a product to a trader by a consumer;
– A payment by a consumer to a trader.
• Need to show:
– purchased a product from a trader;
– trader engaged in behaviour that was either misleading
under Regulation 5 or aggressive under Regulation 7.
• Remedies - depending on the type of contract:
– Unwind the contract and get a refund;
– Discount on the product;
– Damages for the breach.
The Consumer Protection from Unfair
Trading (Amendment) Regulations
2013
46. The Consumer Protection from Unfair
Trading (Amendment) Regulations
2013
• Misleading: includes
– providing false information or information that could
deceive the average consumer;
– marketing a product which causes confusion with
competitor’s products;
– failing to comply with a Code of Practice when you say
you do.
• Aggressive: includes
– Timing and location of the behaviour;
– whether any threatening or abusive language is used or;
– any exploitation by the trader of the consumer’s
personal circumstances.
47. Other issues
• Electoral register
– Electoral Registration & Administration Bill – introduction
of individual electoral registration and system opened up
for digital application.
– Edited version of register will be kept but issue on opt-
outs.
• Employment
– TUPE – Government consultation on changes
• Environment
– Unaddressed mail preference service - awaiting DEFRA
input
48. Other issues
• Financial
– FSA replaced by Financial Conduct Authority and
Prudential Regulatory Authority on 1 April 2013
• New Vision – “To make relevant markets work well
so consumers get a fair deal”
• Consumers get financial services and products that
meet their needs from firms they can trust
• Markets and financial systems are sound and stable
and resilient with transparent pricing information
• Firms compete effectively with the interests of their
consumers and the integrity of the market at the
heart of how they run their business
• ICO Strategy Plan 2013-16
– New website
– Modernise ICO notification system
– Simplify guidance
– Policy challenges
– Strategic review
49. Other issues
• Postal
– Postcode address file – consultation just closed on
changes.
– Simplify licensing process
– Change payment structure
• Telemarketing –
– Culture, Media and Sport Commons Select Committee
enquiry into unsolicited phone calls. Finished hearing
oral evidence – awaiting its report.
– John Mitchison gave evidence on behalf of TPS and
George Kidd on behalf of the Direct Marketing
Commission.
– The DMA also submitted written evidence.
– Nuisance Calls All Party Parliamentary Group enquiry:
TPS and DMA submitted written evidence.
52. Data Protection Compliance
Workshop
23 October 2013
If you are interested in attending please speak to
the girls at the registration desk.
Today is the last day you will benefit from the early
bird price!