SlideShare a Scribd company logo
1
vPrivacy Insight Series
v
EU-US Privacy Shield:
Understanding the New Framework
February 10, 2016
2
vPrivacy Insight Series
Today’s Speakers
Josh Harris
Director of Policy
TRUSTe
Shannon Coe
Team Lead, Data Flows and Privacy
U.S. Department of Commerce
John Bowman
Senior Principal
Promontory
3
vPrivacy Insight Series
• Introduction and Overview
– Josh Harris, Director of Policy, TRUSTe
• EU-U.S. Privacy Shield Framework
– Shannon Coe, Team Lead Data Flows & Privacy, U.S. Department of Commerce
• Next Steps and EU Approval Process
– John Bowman, Senior Principal, Promontory
• Audience Q&A
• Demo of TRUSTe EU Data Privacy Transfer Assessment
Agenda
4
vPrivacy Insight Series
v
Introduction & Overview
Josh Harris
Director of Policy, TRUSTe
5
vPrivacy Insight Series
June 2013: Snowden revelations published by the Guardian
• Timeline of Safe Harbor
Negotiations
• July 2013: EU Parliament calls for
EC review of Safe Harbor
• July 2013: EU VP Reding
announces EC review to commence
• November 2013: EC announces
results of review
• January 2014: Safe Harbor
consultations begin
• Timeline of Schrems Case
• June 2013: Schrems lodges complaint
with the Irish Privacy Commissioner
• July 2013: Irish DPC declines
complaint
• October 2013: Irish High Court agrees
to Judicial Review
• June 2014 : Irish High Court refers
case to the Court of Justice of the
European Union(CJEU)
• September 2015: Advocate General
Opinion announced
October 2015: Safe Harbor Invalidated
6
vPrivacy Insight Series
Transparency
• Companies should publicly
disclose their privacy policies.
• Privacy policies should include a
link to the Department of
Commerce (DoC) Safe Harbor
website.
• Companies should publish
privacy conditions of any
contracts they conclude with
subcontractors
• DoC should flag all companies
which are not current members.
13 EC Recommendations
Redress
• Companies should include a
link to ADR provider in
privacy policy.
• ADR should be readily
available and affordable.
• DoC should monitor ADR
providers regarding the
transparency and
accessibility of information
they provide concerning the
procedure they use and the
follow-up they give to
complaints.
7
vPrivacy Insight Series
Enforcement
• A certain percentage of companies should
be subject to ex officio investigations of
compliance of their privacy policies (going
beyond control of compliance with formal
requirements).
• Whenever there has been a finding of
non-compliance, following a complaint or
an investigation, the company should be
subject to follow-up specific investigation
after 1 year.
• In case of doubts about a company's
compliance DoC should inform the
competent EU data protection authority.
• False claims of Safe Harbor adherence
should continue to be investigated
Access by US authorities
• Privacy policies should include information
on the extent to which US law allows
public authorities to collect and process
data and should be encouraged to
describe the policies in place to comply.
• The national security exception be used
only when strictly necessary or
proportionate.
13 EC Recommendations
8
vPrivacy Insight Series
v
Shannon Coe, Team Lead Data Flows and Privacy
U.S. Department of Commerce
EU-U.S. Privacy Shield
9
vPrivacy Insight Series
Overview of EU-U.S. Privacy Shield (1/3)
The EU-U.S. Privacy Shield significantly improves commercial oversight
and enhances privacy protections
• The Privacy Shield strengthens cooperation between the Federal Trade
Commission and EU Data Protection Authorities, providing independent,
vigorous enforcement of the data protection requirements set forth in the
Privacy Shield.
• EU individuals will have access to multiple avenues to resolve concerns,
including through alternative dispute resolution, now at no cost to the
individual.
• The Department of Commerce will step in directly and use best efforts to
resolve referred complaints, including by dedicating a special team with
significant new resources to supervise compliance with the Privacy Shield.
• The Privacy Shield adds an important new avenue to supplement the others.
Companies now will commit to participate in arbitration as a matter of last
resort to ensure that EU individuals who still have concerns will have the
opportunity to seek legal remedies.
10
vPrivacy Insight Series
Overview of EU-U.S. Privacy Shield (2/3)
• The Privacy Shield embodies a renewed commitment to privacy by the U.S.
and the EU, and to ensure it remains a living framework subject to active
supervision, the Department of Commerce, the FTC, and EU DPAs will hold
annual review meetings to discuss the functioning of and compliance with the
Privacy Shield.
• The Privacy Shield includes significant improvements to improve transparency
regarding personal data use, strengthen the protections participants provide,
and inform EU individuals more comprehensively about their rights under the
program.
• The Privacy Shield includes new contractual privacy protections and oversight
for data transferred by participating companies to third parties or processed by
those companies’ agents to improve accountability and ensure a continuity of
protection.
11
vPrivacy Insight Series
Overview of EU-U.S. Privacy Shield (3/3)
The EU-U.S. Privacy Shield demonstrates the U.S. Commitments to
limitations and safeguards on national security.
• Since 2013, President Obama, including through Presidential Policy Directive 28, has
directed several measures to enhance privacy protections for U.S. signals intelligence
activities, including protections that apply regardless of nationality; enhanced executive
oversight of intelligence activities; and implementation of new legislation that enhances
judicial review of certain intelligence collection activities, increases transparency, and further
ensures that collection of information for intelligence purposes is precisely focused and
targeted.
• In connection with finalization of the new EU-U.S. Privacy Shield, the U.S. Intelligence
Community has described in writing for the European Commission the multiple layers of
constitutional, statutory, and policy safeguards that apply to its operations, with active
oversight provided by all three branches of the U.S. Government.
• The Privacy Shield provides, for the first time, a specific channel for EU individuals to raise
questions regarding signals intelligence activities relating to the Privacy Shield. As a part of
this process, the United States is making the commitment to respond to appropriate requests
regarding these matters, consistent with our national security obligations.
12
vPrivacy Insight Series
v
John Bowman, Senior Principal,
Promontory
Next Steps and EU Approval
Process
13
vPrivacy Insight Series
The Council (the 28 EU member states) and the European Parliament have given the European
Commission the power to determine, on the basis of Article 25(6) of Directive 95/46/EC whether
a third country ensures an adequate level of protection by reason of its domestic law or of the
international commitments it has entered into.
European Commission Adequacy Decisions
AD - Andorra
AR - Argentina
CA - Canada
CH - Switzerland
FO - Faeroe Islands
GG - Guernsey
IL - State of Israel
IM - Isle of Man
JE - Jersey
NZ - New Zealand
US - United States - Safe Harbour
UY - Eastern Republic of Uruguay
European Commission Adequacy Decisions as at February 2016
The effect of these adequacy decisions is that personal data can flow from the 28 EU countries
and three EEA member countries (Norway, Liechtenstein and Iceland) to that third country
without any further safeguard being necessary.
14
vPrivacy Insight Series
Procedure for adopting the Privacy Shield
In order for the EU-US Privacy Shield to become law, a Commission Decision needs to be
adopted on the basis of Article 26(6) of Directive 95/46/EC. This process involves;
• The proposal from the European Commission (the draft text of the new adequacy decision)
• An opinion of the member states supervisory authorities and the European Data Protection
Supervisory (EDPS) in the framework of the Article 29 Working Party (WP29)
• An approval from the Article 31 Committee (member states) under the comitology
‘examination procedure’
• The adoption of the decision by the College of Commissioners
Article 31 of Directive 95/46/EC sets out that the (Article 31) committee shall deliver its opinion
on the draft by a qualified majority vote of member states. However, if these measures are not
in accordance with the opinion of the committee, they shall be communicated by the
Commission to the Council forthwith. In that event:
• the Commission shall defer application of the measures which it has decided for a period of
three months from the date of communication,
• the Council, acting by a qualified majority, may take a different decision within a specified
time limit.
15
vPrivacy Insight Series
• WP29 calls on the Commission to communicate all documents pertaining to the new
arrangement by the end of February
• WP29 will conduct an assessment of the draft decision in light of the European
jurisprudence on fundamental rights which sets four essential guarantees for intelligence
activities:
– Processing should be based on clear, precise and accessible rules
– Necessity and proportionality with regard to the legitimate objectives pursued need to be demonstrated
– An independent oversight mechanism should exist, that is both effective and impartial
– Effective remedies need to be available to the individual
• WP29 will then complete its assessment for all personal data transfers to the US before
holding an extraordinary plenary session where consideration will be given as to whether
other transfer mechanisms (e.g. Binding Corporate Rules and Standard Contractual
Clauses) can be used for personal data transfers to the US
• The Commission and the Article 31 Committee will then consider the report of WP29 and
act on the recommendations accordingly
• The European Parliament may in the meantime issue a letter, opinion or request that the
Commission attend the Parliament
The path to approval in the EU
16
vPrivacy Insight Series
v
Questions?
17
vPrivacy Insight Series
v
Josh Harris jharris@truste.com
John Bowman jmbowman@promontory.com
Contacts
18
vPrivacy Insight Series
v
Stay on the call for a
LIVE DEMO of TRUSTe EU Data Privacy Transfer Assessment
See http://www.truste.com/insightseries for details of our 2016 Privacy
Insight Series and past webinar recordings.
Thank You!
19
vPrivacy Insight Series
Today’s LIVE DEMO Presenter
Joanne Furtsch
Director of Product Policy,
TRUSTe
20
vPrivacy Insight Series
TRUSTe Has You Covered
Whether you meet your EU Data Transfer compliance requirements through
the new Privacy Shield Framework, Model Contract Clauses, or a combination
of the two – TRUSTe has you covered.
To find out more about TRUSTe Assessment Manager, and how TRUSTe can
help you with your EU compliance program,
Visit www.truste.com/business-products/eu-privacy/ or contact your TRUSTe
Rep at 888-878-7830
We have the resources and tools to help you quickly address the forthcoming
compliance deadlines.
21
vPrivacy Insight Series
v
Don’t miss the next webinar in the Series –” Investment in Privacy Brings
Security Results” with Chris Babel, TRUSTe and Sam Pfeifle, IAPP on
March 10th
See http://www.truste.com/insightseries for details of our 2016 Privacy
Insight Series and past webinar recordings.
Thank You!

More Related Content

What's hot

EU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeEU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
TrustArc
 
EU-US Privacy Shield - Safe Harbor Replacement
EU-US Privacy Shield - Safe Harbor ReplacementEU-US Privacy Shield - Safe Harbor Replacement
EU-US Privacy Shield - Safe Harbor Replacement
GACC_Midwest
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...
IISPEastMids
 
Martha Buyer V SCTC day conference 24 feb16
Martha Buyer V SCTC day conference 24 feb16Martha Buyer V SCTC day conference 24 feb16
Martha Buyer V SCTC day conference 24 feb16
Agustin Argelich Casals
 
EU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information FlowEU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information Flow
David Erdos
 
Replacement standard contractual clauses
Replacement standard contractual clausesReplacement standard contractual clauses
Replacement standard contractual clauses
Brian Miller, Solicitor
 
Cross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy ShieldCross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy Shield
Parsons Behle & Latimer
 
Patricia Ayojedi V SCTC day Cloud 24 feb16
Patricia Ayojedi V SCTC day Cloud 24 feb16Patricia Ayojedi V SCTC day Cloud 24 feb16
Patricia Ayojedi V SCTC day Cloud 24 feb16
Agustin Argelich Casals
 
Cours CyberSécurité - Privacy
Cours CyberSécurité - PrivacyCours CyberSécurité - Privacy
Cours CyberSécurité - Privacy
Franck Franchin
 
EU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart MeteringEU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart Metering
nuances
 
UK GDPR: What New Direction?
UK GDPR:  What New Direction?UK GDPR:  What New Direction?
UK GDPR: What New Direction?
David Erdos
 
Brexit Data Protection Update: The EU, US and UK Perspective
Brexit Data Protection Update: The EU, US and UK PerspectiveBrexit Data Protection Update: The EU, US and UK Perspective
Brexit Data Protection Update: The EU, US and UK Perspective
TrustArc
 
The GDPR: What About Data Stored or Transmitted Outside the EU?
The GDPR: What About Data Stored or Transmitted Outside the EU?The GDPR: What About Data Stored or Transmitted Outside the EU?
The GDPR: What About Data Stored or Transmitted Outside the EU?
TAG Alliances
 
New Media Internet Expression and European Data Protection
New Media Internet Expression and European Data ProtectionNew Media Internet Expression and European Data Protection
New Media Internet Expression and European Data Protection
David Erdos
 
Evertio Schrems II
Evertio Schrems IIEvertio Schrems II
Evertio Schrems II
Fanny Surjana
 
Building an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTeBuilding an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTe
TrustArc
 
No Man is an Island: The Battle for Data Privacy
No Man is an Island: The Battle for Data PrivacyNo Man is an Island: The Battle for Data Privacy
No Man is an Island: The Battle for Data Privacy
Kate Chan
 
EU Data Protection Requirements Post-Safe Harbor
EU Data Protection Requirements Post-Safe HarborEU Data Protection Requirements Post-Safe Harbor
EU Data Protection Requirements Post-Safe Harbor
Radius - Global Growth Experts
 
International privacy with kevin haley
International privacy with kevin haleyInternational privacy with kevin haley
International privacy with kevin haley
Sarah Fletcher
 

What's hot (20)

EU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeEU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
 
EU-US Privacy Shield - Safe Harbor Replacement
EU-US Privacy Shield - Safe Harbor ReplacementEU-US Privacy Shield - Safe Harbor Replacement
EU-US Privacy Shield - Safe Harbor Replacement
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...
 
Martha Buyer V SCTC day conference 24 feb16
Martha Buyer V SCTC day conference 24 feb16Martha Buyer V SCTC day conference 24 feb16
Martha Buyer V SCTC day conference 24 feb16
 
EU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information FlowEU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information Flow
 
Replacement standard contractual clauses
Replacement standard contractual clausesReplacement standard contractual clauses
Replacement standard contractual clauses
 
Cross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy ShieldCross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy Shield
 
Patricia Ayojedi V SCTC day Cloud 24 feb16
Patricia Ayojedi V SCTC day Cloud 24 feb16Patricia Ayojedi V SCTC day Cloud 24 feb16
Patricia Ayojedi V SCTC day Cloud 24 feb16
 
Cours CyberSécurité - Privacy
Cours CyberSécurité - PrivacyCours CyberSécurité - Privacy
Cours CyberSécurité - Privacy
 
EU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart MeteringEU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart Metering
 
UK GDPR: What New Direction?
UK GDPR:  What New Direction?UK GDPR:  What New Direction?
UK GDPR: What New Direction?
 
Brexit Data Protection Update: The EU, US and UK Perspective
Brexit Data Protection Update: The EU, US and UK PerspectiveBrexit Data Protection Update: The EU, US and UK Perspective
Brexit Data Protection Update: The EU, US and UK Perspective
 
The GDPR: What About Data Stored or Transmitted Outside the EU?
The GDPR: What About Data Stored or Transmitted Outside the EU?The GDPR: What About Data Stored or Transmitted Outside the EU?
The GDPR: What About Data Stored or Transmitted Outside the EU?
 
New Media Internet Expression and European Data Protection
New Media Internet Expression and European Data ProtectionNew Media Internet Expression and European Data Protection
New Media Internet Expression and European Data Protection
 
Evertio Schrems II
Evertio Schrems IIEvertio Schrems II
Evertio Schrems II
 
28014_EY Safe Harbor_UK
28014_EY Safe Harbor_UK28014_EY Safe Harbor_UK
28014_EY Safe Harbor_UK
 
Building an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTeBuilding an Effective Data Privacy Program – 6 Steps from TRUSTe
Building an Effective Data Privacy Program – 6 Steps from TRUSTe
 
No Man is an Island: The Battle for Data Privacy
No Man is an Island: The Battle for Data PrivacyNo Man is an Island: The Battle for Data Privacy
No Man is an Island: The Battle for Data Privacy
 
EU Data Protection Requirements Post-Safe Harbor
EU Data Protection Requirements Post-Safe HarborEU Data Protection Requirements Post-Safe Harbor
EU Data Protection Requirements Post-Safe Harbor
 
International privacy with kevin haley
International privacy with kevin haleyInternational privacy with kevin haley
International privacy with kevin haley
 

Viewers also liked

Webinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTe
Webinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTeWebinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTe
Webinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTe
TrustArc
 
[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know
TrustArc
 
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSAUS Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
TrustArc
 
Privacy shield what you need to know about storing eu data slideshare
Privacy shield what you need to know about storing  eu data slidesharePrivacy shield what you need to know about storing  eu data slideshare
Privacy shield what you need to know about storing eu data slideshare
Freddy Ntwari
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
TrustArc
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
LinkedIn
 
Bloomberg BNA Slide Presentation When States Compete Data Study Results
Bloomberg BNA Slide Presentation When States Compete Data Study ResultsBloomberg BNA Slide Presentation When States Compete Data Study Results
Bloomberg BNA Slide Presentation When States Compete Data Study Results
Bloomberg Tax & Accounting
 
Surviving Technical Terminations; How to Streamline Fixed Assets Management
Surviving Technical Terminations; How to Streamline Fixed Assets ManagementSurviving Technical Terminations; How to Streamline Fixed Assets Management
Surviving Technical Terminations; How to Streamline Fixed Assets Management
Bloomberg Tax & Accounting
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
SlideShare
 

Viewers also liked (9)

Webinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTe
Webinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTeWebinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTe
Webinar on New DAA Guidelines for Ads Compliance in 2016 from TRUSTe
 
[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know
 
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSAUS Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
 
Privacy shield what you need to know about storing eu data slideshare
Privacy shield what you need to know about storing  eu data slidesharePrivacy shield what you need to know about storing  eu data slideshare
Privacy shield what you need to know about storing eu data slideshare
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 
Bloomberg BNA Slide Presentation When States Compete Data Study Results
Bloomberg BNA Slide Presentation When States Compete Data Study ResultsBloomberg BNA Slide Presentation When States Compete Data Study Results
Bloomberg BNA Slide Presentation When States Compete Data Study Results
 
Surviving Technical Terminations; How to Streamline Fixed Assets Management
Surviving Technical Terminations; How to Streamline Fixed Assets ManagementSurviving Technical Terminations; How to Streamline Fixed Assets Management
Surviving Technical Terminations; How to Streamline Fixed Assets Management
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar to EU Privacy Shield - Understanding the New Framework from TRUSTe

Data Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe HarborData Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe Harbor
Gayle Gorvett
 
Privacy shield: What You Need To Know About Storing EU Data
Privacy shield: What You Need To Know About Storing EU DataPrivacy shield: What You Need To Know About Storing EU Data
Privacy shield: What You Need To Know About Storing EU Data
Schellman & Company
 
EU–US Privacy Shield has Flaws
EU–US Privacy Shield has FlawsEU–US Privacy Shield has Flaws
EU–US Privacy Shield has Flaws
Thierry Debels
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
yvtmnvul
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
pqkiykra
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
pchgmf
 
Transatlantic Personal Data Processing: Complying with the new EU-US Privacy ...
Transatlantic Personal Data Processing: Complying with the new EU-US Privacy ...Transatlantic Personal Data Processing: Complying with the new EU-US Privacy ...
Transatlantic Personal Data Processing: Complying with the new EU-US Privacy ...
MSL
 
PECB Webinar: The End of Safe Harbour! What happens Next?
PECB Webinar: The End of Safe Harbour! What happens Next?PECB Webinar: The End of Safe Harbour! What happens Next?
PECB Webinar: The End of Safe Harbour! What happens Next?
PECB
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
Ulf Mattsson
 
TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...
TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...
TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...
TrustArc
 
Eversheds Safe Harbor Developments Webinar
Eversheds Safe Harbor Developments WebinarEversheds Safe Harbor Developments Webinar
Eversheds Safe Harbor Developments Webinar
Eversheds Sutherland
 
六合彩
六合彩六合彩
六合彩
fawymar
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
fpottfb
 
六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideShare六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideShare
vgfnrtwr
 
Members evening - data protection
Members evening - data protectionMembers evening - data protection
Members evening - data protection
MRS
 
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
TrustArc
 
scce-cep-2015-06-Dhont-1-04
scce-cep-2015-06-Dhont-1-04scce-cep-2015-06-Dhont-1-04
scce-cep-2015-06-Dhont-1-04Jan Dhont
 
Data Privacy Protection & Advisory - EY India
Data Privacy Protection & Advisory - EY India Data Privacy Protection & Advisory - EY India
Data Privacy Protection & Advisory - EY India
SadanandGahivare
 
Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006Kimberly Verska
 

Similar to EU Privacy Shield - Understanding the New Framework from TRUSTe (20)

Data Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe HarborData Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe Harbor
 
Privacy shield: What You Need To Know About Storing EU Data
Privacy shield: What You Need To Know About Storing EU DataPrivacy shield: What You Need To Know About Storing EU Data
Privacy shield: What You Need To Know About Storing EU Data
 
EU–US Privacy Shield has Flaws
EU–US Privacy Shield has FlawsEU–US Privacy Shield has Flaws
EU–US Privacy Shield has Flaws
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
Transatlantic Personal Data Processing: Complying with the new EU-US Privacy ...
Transatlantic Personal Data Processing: Complying with the new EU-US Privacy ...Transatlantic Personal Data Processing: Complying with the new EU-US Privacy ...
Transatlantic Personal Data Processing: Complying with the new EU-US Privacy ...
 
PECB Webinar: The End of Safe Harbour! What happens Next?
PECB Webinar: The End of Safe Harbour! What happens Next?PECB Webinar: The End of Safe Harbour! What happens Next?
PECB Webinar: The End of Safe Harbour! What happens Next?
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...
TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...
TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...
 
Eversheds Safe Harbor Developments Webinar
Eversheds Safe Harbor Developments WebinarEversheds Safe Harbor Developments Webinar
Eversheds Safe Harbor Developments Webinar
 
六合彩
六合彩六合彩
六合彩
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
 
六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideShare六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideShare
 
Members evening - data protection
Members evening - data protectionMembers evening - data protection
Members evening - data protection
 
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
 
scce-cep-2015-06-Dhont-1-04
scce-cep-2015-06-Dhont-1-04scce-cep-2015-06-Dhont-1-04
scce-cep-2015-06-Dhont-1-04
 
FINAL REPORT
FINAL REPORTFINAL REPORT
FINAL REPORT
 
Data Privacy Protection & Advisory - EY India
Data Privacy Protection & Advisory - EY India Data Privacy Protection & Advisory - EY India
Data Privacy Protection & Advisory - EY India
 
Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006
 

More from TrustArc

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
TrustArc
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
TrustArc
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
TrustArc
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
TrustArc
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
TrustArc
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
TrustArc
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
TrustArc
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
TrustArc
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
TrustArc
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
TrustArc
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
TrustArc
 

More from TrustArc (20)

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 

Recently uploaded

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 

Recently uploaded (20)

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 

EU Privacy Shield - Understanding the New Framework from TRUSTe

  • 1. 1 vPrivacy Insight Series v EU-US Privacy Shield: Understanding the New Framework February 10, 2016
  • 2. 2 vPrivacy Insight Series Today’s Speakers Josh Harris Director of Policy TRUSTe Shannon Coe Team Lead, Data Flows and Privacy U.S. Department of Commerce John Bowman Senior Principal Promontory
  • 3. 3 vPrivacy Insight Series • Introduction and Overview – Josh Harris, Director of Policy, TRUSTe • EU-U.S. Privacy Shield Framework – Shannon Coe, Team Lead Data Flows & Privacy, U.S. Department of Commerce • Next Steps and EU Approval Process – John Bowman, Senior Principal, Promontory • Audience Q&A • Demo of TRUSTe EU Data Privacy Transfer Assessment Agenda
  • 4. 4 vPrivacy Insight Series v Introduction & Overview Josh Harris Director of Policy, TRUSTe
  • 5. 5 vPrivacy Insight Series June 2013: Snowden revelations published by the Guardian • Timeline of Safe Harbor Negotiations • July 2013: EU Parliament calls for EC review of Safe Harbor • July 2013: EU VP Reding announces EC review to commence • November 2013: EC announces results of review • January 2014: Safe Harbor consultations begin • Timeline of Schrems Case • June 2013: Schrems lodges complaint with the Irish Privacy Commissioner • July 2013: Irish DPC declines complaint • October 2013: Irish High Court agrees to Judicial Review • June 2014 : Irish High Court refers case to the Court of Justice of the European Union(CJEU) • September 2015: Advocate General Opinion announced October 2015: Safe Harbor Invalidated
  • 6. 6 vPrivacy Insight Series Transparency • Companies should publicly disclose their privacy policies. • Privacy policies should include a link to the Department of Commerce (DoC) Safe Harbor website. • Companies should publish privacy conditions of any contracts they conclude with subcontractors • DoC should flag all companies which are not current members. 13 EC Recommendations Redress • Companies should include a link to ADR provider in privacy policy. • ADR should be readily available and affordable. • DoC should monitor ADR providers regarding the transparency and accessibility of information they provide concerning the procedure they use and the follow-up they give to complaints.
  • 7. 7 vPrivacy Insight Series Enforcement • A certain percentage of companies should be subject to ex officio investigations of compliance of their privacy policies (going beyond control of compliance with formal requirements). • Whenever there has been a finding of non-compliance, following a complaint or an investigation, the company should be subject to follow-up specific investigation after 1 year. • In case of doubts about a company's compliance DoC should inform the competent EU data protection authority. • False claims of Safe Harbor adherence should continue to be investigated Access by US authorities • Privacy policies should include information on the extent to which US law allows public authorities to collect and process data and should be encouraged to describe the policies in place to comply. • The national security exception be used only when strictly necessary or proportionate. 13 EC Recommendations
  • 8. 8 vPrivacy Insight Series v Shannon Coe, Team Lead Data Flows and Privacy U.S. Department of Commerce EU-U.S. Privacy Shield
  • 9. 9 vPrivacy Insight Series Overview of EU-U.S. Privacy Shield (1/3) The EU-U.S. Privacy Shield significantly improves commercial oversight and enhances privacy protections • The Privacy Shield strengthens cooperation between the Federal Trade Commission and EU Data Protection Authorities, providing independent, vigorous enforcement of the data protection requirements set forth in the Privacy Shield. • EU individuals will have access to multiple avenues to resolve concerns, including through alternative dispute resolution, now at no cost to the individual. • The Department of Commerce will step in directly and use best efforts to resolve referred complaints, including by dedicating a special team with significant new resources to supervise compliance with the Privacy Shield. • The Privacy Shield adds an important new avenue to supplement the others. Companies now will commit to participate in arbitration as a matter of last resort to ensure that EU individuals who still have concerns will have the opportunity to seek legal remedies.
  • 10. 10 vPrivacy Insight Series Overview of EU-U.S. Privacy Shield (2/3) • The Privacy Shield embodies a renewed commitment to privacy by the U.S. and the EU, and to ensure it remains a living framework subject to active supervision, the Department of Commerce, the FTC, and EU DPAs will hold annual review meetings to discuss the functioning of and compliance with the Privacy Shield. • The Privacy Shield includes significant improvements to improve transparency regarding personal data use, strengthen the protections participants provide, and inform EU individuals more comprehensively about their rights under the program. • The Privacy Shield includes new contractual privacy protections and oversight for data transferred by participating companies to third parties or processed by those companies’ agents to improve accountability and ensure a continuity of protection.
  • 11. 11 vPrivacy Insight Series Overview of EU-U.S. Privacy Shield (3/3) The EU-U.S. Privacy Shield demonstrates the U.S. Commitments to limitations and safeguards on national security. • Since 2013, President Obama, including through Presidential Policy Directive 28, has directed several measures to enhance privacy protections for U.S. signals intelligence activities, including protections that apply regardless of nationality; enhanced executive oversight of intelligence activities; and implementation of new legislation that enhances judicial review of certain intelligence collection activities, increases transparency, and further ensures that collection of information for intelligence purposes is precisely focused and targeted. • In connection with finalization of the new EU-U.S. Privacy Shield, the U.S. Intelligence Community has described in writing for the European Commission the multiple layers of constitutional, statutory, and policy safeguards that apply to its operations, with active oversight provided by all three branches of the U.S. Government. • The Privacy Shield provides, for the first time, a specific channel for EU individuals to raise questions regarding signals intelligence activities relating to the Privacy Shield. As a part of this process, the United States is making the commitment to respond to appropriate requests regarding these matters, consistent with our national security obligations.
  • 12. 12 vPrivacy Insight Series v John Bowman, Senior Principal, Promontory Next Steps and EU Approval Process
  • 13. 13 vPrivacy Insight Series The Council (the 28 EU member states) and the European Parliament have given the European Commission the power to determine, on the basis of Article 25(6) of Directive 95/46/EC whether a third country ensures an adequate level of protection by reason of its domestic law or of the international commitments it has entered into. European Commission Adequacy Decisions AD - Andorra AR - Argentina CA - Canada CH - Switzerland FO - Faeroe Islands GG - Guernsey IL - State of Israel IM - Isle of Man JE - Jersey NZ - New Zealand US - United States - Safe Harbour UY - Eastern Republic of Uruguay European Commission Adequacy Decisions as at February 2016 The effect of these adequacy decisions is that personal data can flow from the 28 EU countries and three EEA member countries (Norway, Liechtenstein and Iceland) to that third country without any further safeguard being necessary.
  • 14. 14 vPrivacy Insight Series Procedure for adopting the Privacy Shield In order for the EU-US Privacy Shield to become law, a Commission Decision needs to be adopted on the basis of Article 26(6) of Directive 95/46/EC. This process involves; • The proposal from the European Commission (the draft text of the new adequacy decision) • An opinion of the member states supervisory authorities and the European Data Protection Supervisory (EDPS) in the framework of the Article 29 Working Party (WP29) • An approval from the Article 31 Committee (member states) under the comitology ‘examination procedure’ • The adoption of the decision by the College of Commissioners Article 31 of Directive 95/46/EC sets out that the (Article 31) committee shall deliver its opinion on the draft by a qualified majority vote of member states. However, if these measures are not in accordance with the opinion of the committee, they shall be communicated by the Commission to the Council forthwith. In that event: • the Commission shall defer application of the measures which it has decided for a period of three months from the date of communication, • the Council, acting by a qualified majority, may take a different decision within a specified time limit.
  • 15. 15 vPrivacy Insight Series • WP29 calls on the Commission to communicate all documents pertaining to the new arrangement by the end of February • WP29 will conduct an assessment of the draft decision in light of the European jurisprudence on fundamental rights which sets four essential guarantees for intelligence activities: – Processing should be based on clear, precise and accessible rules – Necessity and proportionality with regard to the legitimate objectives pursued need to be demonstrated – An independent oversight mechanism should exist, that is both effective and impartial – Effective remedies need to be available to the individual • WP29 will then complete its assessment for all personal data transfers to the US before holding an extraordinary plenary session where consideration will be given as to whether other transfer mechanisms (e.g. Binding Corporate Rules and Standard Contractual Clauses) can be used for personal data transfers to the US • The Commission and the Article 31 Committee will then consider the report of WP29 and act on the recommendations accordingly • The European Parliament may in the meantime issue a letter, opinion or request that the Commission attend the Parliament The path to approval in the EU
  • 17. 17 vPrivacy Insight Series v Josh Harris jharris@truste.com John Bowman jmbowman@promontory.com Contacts
  • 18. 18 vPrivacy Insight Series v Stay on the call for a LIVE DEMO of TRUSTe EU Data Privacy Transfer Assessment See http://www.truste.com/insightseries for details of our 2016 Privacy Insight Series and past webinar recordings. Thank You!
  • 19. 19 vPrivacy Insight Series Today’s LIVE DEMO Presenter Joanne Furtsch Director of Product Policy, TRUSTe
  • 20. 20 vPrivacy Insight Series TRUSTe Has You Covered Whether you meet your EU Data Transfer compliance requirements through the new Privacy Shield Framework, Model Contract Clauses, or a combination of the two – TRUSTe has you covered. To find out more about TRUSTe Assessment Manager, and how TRUSTe can help you with your EU compliance program, Visit www.truste.com/business-products/eu-privacy/ or contact your TRUSTe Rep at 888-878-7830 We have the resources and tools to help you quickly address the forthcoming compliance deadlines.
  • 21. 21 vPrivacy Insight Series v Don’t miss the next webinar in the Series –” Investment in Privacy Brings Security Results” with Chris Babel, TRUSTe and Sam Pfeifle, IAPP on March 10th See http://www.truste.com/insightseries for details of our 2016 Privacy Insight Series and past webinar recordings. Thank You!