This document summarizes a presentation on the proposed new EU Data Protection Regulation. It outlines the following key points:
1. The proposed regulation would directly apply across the EU and expand definitions of personal data and those covered. Explicit consent would be required in many cases.
2. It emphasizes greater accountability, such as requiring data protection officers. It also mandates notification of data security breaches within 24 hours.
3. Sanctions for non-compliance would be more onerous, allowing fines of up to 4% of annual global turnover.
The presentation provides an overview of the proposed regulation and some of the implications and compliance considerations for businesses.
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec
With the enhanced data security and breach notification standards defined in the GDPR, many organizations are looking to build out an effective incident response strategy to meet the notification requirements.
To view this webinar on demand, click here: https://symc.ly/2GCfgkM.
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...Symantec
This document discusses the General Data Protection Regulation (GDPR) and what North American companies need to know about complying with it. It provides an overview of the GDPR, its impact on companies outside the EU, and who is responsible for protecting personal data under the regulation. It also discusses technology considerations for GDPR compliance, such as knowing where personal data is located, having the right security controls, and being able to detect and respond to breaches. The document concludes by offering advice on how companies can get started with GDPR compliance efforts by focusing first on their data and putting security basics in place.
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
Learn more about the transfer of personal data across borders, including best practices for protecting your information against physical and virtual threats in order to maintain data integrity and confidentiality.
To view the on demand version of the webinar click here: https://symc.ly/2uLlDNf.
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec
The document summarizes a presentation about maintaining security and compliance with the General Data Protection Regulation (GDPR) in the cloud. It discusses key aspects of the GDPR, challenges of GDPR compliance in the cloud, and how Symantec products like Data Loss Prevention, Cloud Access Security Broker, and Information Centric Security solutions can help organizations address those challenges by providing visibility, protection and control of personal data across on-premise and cloud environments. Representatives from Symantec and Deloitte then took questions from the audience.
This document discusses data privacy and the General Data Protection Regulation (GDPR). It begins with an overview of the context and definitions related to GDPR, including personal data, processing, controllers, processors, and data breaches. It then outlines 12 key principles of GDPR, such as accountability, consumer rights, privacy by design, information security, penalties, and data privacy officers. The document concludes by discussing some of the consequences of GDPR for companies and the methodology for complying with its requirements, including risk analysis, records of processing, and training.
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec
Learn how to leverage state of the art technology to build an efficient data protection risk management strategy.
To view the webinar on demand, click here: https://symc.ly/2GU8Ehb.
This document discusses accountability and privacy management programs. It defines accountability as an obligation to be responsible and transparent for one's actions. The presentation discusses how accountability has evolved as a key privacy principle in regulations around the world. It also provides examples of how organizations can demonstrate accountability through comprehensive privacy programs that include governance, risk assessment, compliance monitoring, and response procedures. The document emphasizes that accountability requires evidence of ongoing privacy activities and management rather than just point-in-time compliance.
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumConstantine Karbaliotis
The GDPR will impact Canadian companies that do business in Europe in several ways:
1. Canadian companies will face new obligations around data protection and privacy to comply with the GDPR, including requirements for obtaining consent from individuals and providing certain privacy rights.
2. The GDPR may impact Canada's status as having adequate privacy laws as determined by European regulators. Canada's privacy laws may need to be strengthened to maintain this status and allow for continued data transfers between Europe and Canada.
3. Canadian companies will need to analyze how the GDPR's new requirements around areas like data breaches, international transfers, and individual rights will operationally impact their business practices and data handling. They may need to make changes to
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec
With the enhanced data security and breach notification standards defined in the GDPR, many organizations are looking to build out an effective incident response strategy to meet the notification requirements.
To view this webinar on demand, click here: https://symc.ly/2GCfgkM.
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...Symantec
This document discusses the General Data Protection Regulation (GDPR) and what North American companies need to know about complying with it. It provides an overview of the GDPR, its impact on companies outside the EU, and who is responsible for protecting personal data under the regulation. It also discusses technology considerations for GDPR compliance, such as knowing where personal data is located, having the right security controls, and being able to detect and respond to breaches. The document concludes by offering advice on how companies can get started with GDPR compliance efforts by focusing first on their data and putting security basics in place.
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
Learn more about the transfer of personal data across borders, including best practices for protecting your information against physical and virtual threats in order to maintain data integrity and confidentiality.
To view the on demand version of the webinar click here: https://symc.ly/2uLlDNf.
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec
The document summarizes a presentation about maintaining security and compliance with the General Data Protection Regulation (GDPR) in the cloud. It discusses key aspects of the GDPR, challenges of GDPR compliance in the cloud, and how Symantec products like Data Loss Prevention, Cloud Access Security Broker, and Information Centric Security solutions can help organizations address those challenges by providing visibility, protection and control of personal data across on-premise and cloud environments. Representatives from Symantec and Deloitte then took questions from the audience.
This document discusses data privacy and the General Data Protection Regulation (GDPR). It begins with an overview of the context and definitions related to GDPR, including personal data, processing, controllers, processors, and data breaches. It then outlines 12 key principles of GDPR, such as accountability, consumer rights, privacy by design, information security, penalties, and data privacy officers. The document concludes by discussing some of the consequences of GDPR for companies and the methodology for complying with its requirements, including risk analysis, records of processing, and training.
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec
Learn how to leverage state of the art technology to build an efficient data protection risk management strategy.
To view the webinar on demand, click here: https://symc.ly/2GU8Ehb.
This document discusses accountability and privacy management programs. It defines accountability as an obligation to be responsible and transparent for one's actions. The presentation discusses how accountability has evolved as a key privacy principle in regulations around the world. It also provides examples of how organizations can demonstrate accountability through comprehensive privacy programs that include governance, risk assessment, compliance monitoring, and response procedures. The document emphasizes that accountability requires evidence of ongoing privacy activities and management rather than just point-in-time compliance.
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumConstantine Karbaliotis
The GDPR will impact Canadian companies that do business in Europe in several ways:
1. Canadian companies will face new obligations around data protection and privacy to comply with the GDPR, including requirements for obtaining consent from individuals and providing certain privacy rights.
2. The GDPR may impact Canada's status as having adequate privacy laws as determined by European regulators. Canada's privacy laws may need to be strengthened to maintain this status and allow for continued data transfers between Europe and Canada.
3. Canadian companies will need to analyze how the GDPR's new requirements around areas like data breaches, international transfers, and individual rights will operationally impact their business practices and data handling. They may need to make changes to
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec
GDPR penalties begin in May 2018, yet many organizations are still developing plans and may not be ready. Symantec has identified a four stage approach to GDPR readiness.
To view this webinar now on-demand click here: https://symc.ly/2JgiOa9.
CyNation - 7 things you should know about EU-GDPRShadi A. Razak
The document provides an overview of the EU General Data Protection Regulation (GDPR). It discusses the GDPR's aim to standardize data protection across the EU through one set of rules. The GDPR aims to strengthen data protection for all EU citizens and benefit businesses through a single market. Non-compliance can result in fines of up to 20 million euros or 4% of global revenue. The document outlines seven things organizations should know about the GDPR and seven steps to become compliant, including auditing data, designating a data protection officer, and implementing security measures.
This document summarizes the key topics covered in a presentation about understanding, minimizing, and mitigating risk in cloud computing. The presentation discusses: 1) different cloud computing models and their relationships; 2) how to distinguish cloud computing from outsourcing and application service providers; 3) commercial and business considerations for selecting a cloud vendor and minimizing risks; and 4) strategies for negotiating cloud contracts to allocate risks appropriately. The presenter emphasizes having a thoughtful strategy for which business processes to move to the cloud and how to plan for inevitable mistakes.
Contracting in the Cloud by Tammy Bortzitnewsafrica
This document discusses key legal issues related to contracting in the cloud, including the contract, data privacy, security, liability, and termination. It notes that South Africa currently lacks specific legislation regulating cloud services. Internationally, groups have proposed guidelines around privacy, security and data transfers. When using cloud services, businesses must understand their legal risks and carefully review provider terms, policies, and security capabilities. The Protection of Personal Information Bill, once enacted, will impact how South African companies transfer personal data to offshore cloud providers.
General Data Protection Regulation (GDPR) Karina Matos
This document summarizes Microsoft's approach to privacy and data protection. It discusses Microsoft's privacy principles of transparency, security, compliance and privacy. It outlines Microsoft's privacy governance structure and investments in cybersecurity. It also discusses Microsoft's efforts to comply with privacy regulations like GDPR and respect for data subject rights and privacy by design.
CyNation: 7 Things You Should Know about EU GDPRIryna Chekanava
An overview of EU GDPR key characteristics, its origins and legal implications of non-compliance. It also provides the initial steps that an organisation needs to follow to operate in compliance with new cyber security regulatory landscape.
The Evolution of Data Privacy: 3 Things You Need To ConsiderSymantec
The European Union’s proposed General Data Protection Regulation (GDPR) has left even the most informed confused. This new regulation has been designed
to update the current directive which was drafted in a time that was in technology terms, prehistoric. It’s time to evolve.
Ø Data protection principles set out the main responsibilities for organizations handling personal data, including processing data fairly and lawfully, only collecting data needed for the purpose, keeping data accurate, not storing it longer than needed, securing the data, and being accountable.
Ø Organizations must have a lawful basis to process personal data and do so in a transparent way by providing privacy notices. They can only use data for the specified purpose, not indefinitely or for new unspecified purposes. They must also minimize the data collected, keep it accurate, securely delete unneeded data, and keep records demonstrating compliance.
This document discusses risks to data security and privacy for businesses and the growing liability risks associated with data breaches. It notes that commercial general liability and professional liability policies often have gaps in coverage for privacy breaches. The document recommends that businesses obtain specialized privacy and data loss liability insurance policies to transfer risks and cover costs associated with first and third-party losses from security incidents. It emphasizes reviewing existing insurance policies and procuring appropriate risk transfer solutions to limit liability for privacy data breaches.
n this webinar, GDPR expert, Richard Hogg, answers the following questions:
What will the GDPR mean for my organization?
Where do I start on the journey to compliance?
What tools and technology are available to help?
Attendees: Operations, Finance, Compliance, Governance, IT
https://www.integro.com/recorded-webinar/nov-17-2016-gdpr
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
The European Union’s proposed General Data Protection Regulation (GDPR) has left even the most informed confused. This new regulation is designed to update the current legislation which was drafted in a time that was in technology terms, prehistoric.
The Data Protection Directive, drafted back in 1995, harks back to a time when data processing was more about filing
cabinets than data rack enclosures. It’s time to evolve.
Business is based on trust. In the cloud, to deserve the trust of its customers and others, a company must be able to demonstrate that it protects the privacy and security of the data in its custody. It must communicate clearly and specifically the nature and extent of the measures taken to protect these data, and show how they meet the existing legal and regulatory requirements, standards, best practices and benchmarks. Customers, on the other end, need tools to evaluate and compare different offerings so that they can decide which one deserves their trust and their business.
The document discusses the Cloud Security Alliance (CSA), a global non-profit organization focused on cloud security. It notes that CSA has over 49,000 members and 200 corporate members in 70 chapters worldwide. The New Zealand chapter has over 300 members and focuses on research areas like data governance, privacy, and cloud auditing. The document then discusses issues around sovereignty and national security laws in various countries as they relate to intelligence gathering and citizens' rights. It presents the results of several surveys on these topics. Finally, it argues for principles of transparency, legal protection, compliance, and accountability to better govern data in the cloud.
Convince your board: How to prepare your business for List XDave James
This presentation provides tips to convince a board of directors to pursue List X status. List X refers to contractors approved to handle classified UK government information. To obtain List X sponsorship, a company must demonstrate it meets basic requirements like having proper security roles in place and can protect classified information. The presentation outlines five tips: understand the contract's requirements; meet company requirements; assess security risks; define the secure physical space; and prepare the IT system. Achieving List X requires board commitment to implement good security practices.
The Evolution of Data Privacy: 3 things you didn’t knowSymantec
The European Union’s proposed General Data Protection Regulation (GDPR) has left even the most informed confused. This new regulation has been designed to update the current directive which was drafted in a time that was in technology terms, prehistoric. It’s time to evolve.
25 May 2018, the General Data Protection Regulation (GDPR) deadline, is less than 6 months away.
As the attention on the regulation is at the top, there is now a growing concern for any organization that is affected by.
We would like to invite you to join our webinar to share with you our approach and help your organization and you document repository to be compliant with GDPR.
During the webinar, our special guests, George Parapadakis – Business Solutions Strategy, Alfresco and Bart van Bouwel – Managing Partner, CDI-Partners, will provide you with:
- How to implement GDPR in your document repository
- How the Alfresco Digital Business Platform can help your organization to be compliant with GDPR
- Xenit approach: a managed shared drive
-Xenit demonstration
-Top tips to start preparing for the GDPR.
Convince your board - Ten steps to GDPR complianceDave James
The document provides a 10 step checklist to help organizations prepare for the EU's General Data Protection Regulation (GDPR) compliance deadline of May 25th, 2018. The steps include appointing a Data Protection Officer, training staff, updating privacy policies and consent processes, conducting privacy impact assessments, reviewing data sharing agreements, securing personal data, and mapping data flows. Additional resources on GDPR compliance from Ascentor and the UK Information Commissioner's Office are also listed. Ascentor offers GDPR compliance consulting services to help organizations prepare for the new regulation.
The document discusses data protection and the General Data Protection Regulation (GDPR) 150 days after its implementation. It provides an overview of GDPR including its key principles of lawfulness, fairness and transparency. It discusses how GDPR aims to protect individuals' personal data and provides examples of its impact and best practices for compliance, noting organizations should maintain momentum on compliance, refine internal processes, and monitor external regulatory developments. Speakers from MCI Benelux and Aventri shared their perspectives on GDPR 150 days after implementation.
This document discusses user research, marketing, and design-driven approaches to redesigning experiences. It mentions an experiment redesigning MyColorscreen and includes screenshots from that process. It also lists names of people from Beijing, China, Indonesia, and Malaysia and includes a quote about why people buy things.
The document discusses an approach to integrated production modeling (IPM) that uses both reservoir-focused and facilities-focused IPM tools. It describes how the two models can work together and exchange information to better model the entire production system from reservoir to facilities. Case studies are presented on using the twin IPM approach to minimize pre-investment for corrosion and model a cold flow hydrate management system. The approach allows subsurface and facilities teams to focus on their areas while still integrating across disciplines.
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec
GDPR penalties begin in May 2018, yet many organizations are still developing plans and may not be ready. Symantec has identified a four stage approach to GDPR readiness.
To view this webinar now on-demand click here: https://symc.ly/2JgiOa9.
CyNation - 7 things you should know about EU-GDPRShadi A. Razak
The document provides an overview of the EU General Data Protection Regulation (GDPR). It discusses the GDPR's aim to standardize data protection across the EU through one set of rules. The GDPR aims to strengthen data protection for all EU citizens and benefit businesses through a single market. Non-compliance can result in fines of up to 20 million euros or 4% of global revenue. The document outlines seven things organizations should know about the GDPR and seven steps to become compliant, including auditing data, designating a data protection officer, and implementing security measures.
This document summarizes the key topics covered in a presentation about understanding, minimizing, and mitigating risk in cloud computing. The presentation discusses: 1) different cloud computing models and their relationships; 2) how to distinguish cloud computing from outsourcing and application service providers; 3) commercial and business considerations for selecting a cloud vendor and minimizing risks; and 4) strategies for negotiating cloud contracts to allocate risks appropriately. The presenter emphasizes having a thoughtful strategy for which business processes to move to the cloud and how to plan for inevitable mistakes.
Contracting in the Cloud by Tammy Bortzitnewsafrica
This document discusses key legal issues related to contracting in the cloud, including the contract, data privacy, security, liability, and termination. It notes that South Africa currently lacks specific legislation regulating cloud services. Internationally, groups have proposed guidelines around privacy, security and data transfers. When using cloud services, businesses must understand their legal risks and carefully review provider terms, policies, and security capabilities. The Protection of Personal Information Bill, once enacted, will impact how South African companies transfer personal data to offshore cloud providers.
General Data Protection Regulation (GDPR) Karina Matos
This document summarizes Microsoft's approach to privacy and data protection. It discusses Microsoft's privacy principles of transparency, security, compliance and privacy. It outlines Microsoft's privacy governance structure and investments in cybersecurity. It also discusses Microsoft's efforts to comply with privacy regulations like GDPR and respect for data subject rights and privacy by design.
CyNation: 7 Things You Should Know about EU GDPRIryna Chekanava
An overview of EU GDPR key characteristics, its origins and legal implications of non-compliance. It also provides the initial steps that an organisation needs to follow to operate in compliance with new cyber security regulatory landscape.
The Evolution of Data Privacy: 3 Things You Need To ConsiderSymantec
The European Union’s proposed General Data Protection Regulation (GDPR) has left even the most informed confused. This new regulation has been designed
to update the current directive which was drafted in a time that was in technology terms, prehistoric. It’s time to evolve.
Ø Data protection principles set out the main responsibilities for organizations handling personal data, including processing data fairly and lawfully, only collecting data needed for the purpose, keeping data accurate, not storing it longer than needed, securing the data, and being accountable.
Ø Organizations must have a lawful basis to process personal data and do so in a transparent way by providing privacy notices. They can only use data for the specified purpose, not indefinitely or for new unspecified purposes. They must also minimize the data collected, keep it accurate, securely delete unneeded data, and keep records demonstrating compliance.
This document discusses risks to data security and privacy for businesses and the growing liability risks associated with data breaches. It notes that commercial general liability and professional liability policies often have gaps in coverage for privacy breaches. The document recommends that businesses obtain specialized privacy and data loss liability insurance policies to transfer risks and cover costs associated with first and third-party losses from security incidents. It emphasizes reviewing existing insurance policies and procuring appropriate risk transfer solutions to limit liability for privacy data breaches.
n this webinar, GDPR expert, Richard Hogg, answers the following questions:
What will the GDPR mean for my organization?
Where do I start on the journey to compliance?
What tools and technology are available to help?
Attendees: Operations, Finance, Compliance, Governance, IT
https://www.integro.com/recorded-webinar/nov-17-2016-gdpr
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
The European Union’s proposed General Data Protection Regulation (GDPR) has left even the most informed confused. This new regulation is designed to update the current legislation which was drafted in a time that was in technology terms, prehistoric.
The Data Protection Directive, drafted back in 1995, harks back to a time when data processing was more about filing
cabinets than data rack enclosures. It’s time to evolve.
Business is based on trust. In the cloud, to deserve the trust of its customers and others, a company must be able to demonstrate that it protects the privacy and security of the data in its custody. It must communicate clearly and specifically the nature and extent of the measures taken to protect these data, and show how they meet the existing legal and regulatory requirements, standards, best practices and benchmarks. Customers, on the other end, need tools to evaluate and compare different offerings so that they can decide which one deserves their trust and their business.
The document discusses the Cloud Security Alliance (CSA), a global non-profit organization focused on cloud security. It notes that CSA has over 49,000 members and 200 corporate members in 70 chapters worldwide. The New Zealand chapter has over 300 members and focuses on research areas like data governance, privacy, and cloud auditing. The document then discusses issues around sovereignty and national security laws in various countries as they relate to intelligence gathering and citizens' rights. It presents the results of several surveys on these topics. Finally, it argues for principles of transparency, legal protection, compliance, and accountability to better govern data in the cloud.
Convince your board: How to prepare your business for List XDave James
This presentation provides tips to convince a board of directors to pursue List X status. List X refers to contractors approved to handle classified UK government information. To obtain List X sponsorship, a company must demonstrate it meets basic requirements like having proper security roles in place and can protect classified information. The presentation outlines five tips: understand the contract's requirements; meet company requirements; assess security risks; define the secure physical space; and prepare the IT system. Achieving List X requires board commitment to implement good security practices.
The Evolution of Data Privacy: 3 things you didn’t knowSymantec
The European Union’s proposed General Data Protection Regulation (GDPR) has left even the most informed confused. This new regulation has been designed to update the current directive which was drafted in a time that was in technology terms, prehistoric. It’s time to evolve.
25 May 2018, the General Data Protection Regulation (GDPR) deadline, is less than 6 months away.
As the attention on the regulation is at the top, there is now a growing concern for any organization that is affected by.
We would like to invite you to join our webinar to share with you our approach and help your organization and you document repository to be compliant with GDPR.
During the webinar, our special guests, George Parapadakis – Business Solutions Strategy, Alfresco and Bart van Bouwel – Managing Partner, CDI-Partners, will provide you with:
- How to implement GDPR in your document repository
- How the Alfresco Digital Business Platform can help your organization to be compliant with GDPR
- Xenit approach: a managed shared drive
-Xenit demonstration
-Top tips to start preparing for the GDPR.
Convince your board - Ten steps to GDPR complianceDave James
The document provides a 10 step checklist to help organizations prepare for the EU's General Data Protection Regulation (GDPR) compliance deadline of May 25th, 2018. The steps include appointing a Data Protection Officer, training staff, updating privacy policies and consent processes, conducting privacy impact assessments, reviewing data sharing agreements, securing personal data, and mapping data flows. Additional resources on GDPR compliance from Ascentor and the UK Information Commissioner's Office are also listed. Ascentor offers GDPR compliance consulting services to help organizations prepare for the new regulation.
The document discusses data protection and the General Data Protection Regulation (GDPR) 150 days after its implementation. It provides an overview of GDPR including its key principles of lawfulness, fairness and transparency. It discusses how GDPR aims to protect individuals' personal data and provides examples of its impact and best practices for compliance, noting organizations should maintain momentum on compliance, refine internal processes, and monitor external regulatory developments. Speakers from MCI Benelux and Aventri shared their perspectives on GDPR 150 days after implementation.
This document discusses user research, marketing, and design-driven approaches to redesigning experiences. It mentions an experiment redesigning MyColorscreen and includes screenshots from that process. It also lists names of people from Beijing, China, Indonesia, and Malaysia and includes a quote about why people buy things.
The document discusses an approach to integrated production modeling (IPM) that uses both reservoir-focused and facilities-focused IPM tools. It describes how the two models can work together and exchange information to better model the entire production system from reservoir to facilities. Case studies are presented on using the twin IPM approach to minimize pre-investment for corrosion and model a cold flow hydrate management system. The approach allows subsurface and facilities teams to focus on their areas while still integrating across disciplines.
10 lbs apps from china worth attention momobeijing
The document discusses location-based mobile apps from China that are worth attention. It outlines different business models, product forms, and examples of location-based apps in China. Specifically, it mentions apps that provide location-based electronic commerce, games, and social networks. It also lists apps that make everyday tasks like finding washrooms or exploring tourist spots easier. The document encourages the reader to contact the author to learn more about location-based services in China.
The document discusses how digitization is transforming society through search engines becoming the gateway to knowledge on the web, connecting people globally, and augmenting reality with new technologies. It touches on topics like how technology is impacting behaviors and emotions, debates around environmental issues, and how the internet has made everyone less unique.
The document discusses traffic and invites the reader to join an effort to address traffic problems. It references an IBM Commuter Pain Index study and promotes a startup website called wodache.com for finding transportation alternatives. The final lines encourage having fun and riding with others to deal with traffic issues.
This document discusses a location-based mobile game that allows users to check-in at venues to gain levels and upgrades, buy and interact with owned venues, unlock achievements and items, and play with friends by syncing to social networks. It explores connecting users to locations through local information sharing, socializing, and geo-printing, and introduces a new genre of gaming that blends reality with rewards. Future elements may include compass, altitude and camera integration.
TouchChina develops location-based travel apps and guides for Chinese tourists. It provides city guides, site guides, and travel utilities for major destinations in China. The apps offer accommodation, transportation, attractions, entertainment and shopping recommendations and booking. TouchChina has developed guides for 8 cities and 60 attractions. It has received awards and promotion from Apple's App Store and Chinese companies. TouchChina partners with tourist sites to provide tickets, content and promotions while sharing ownership and revenue through an O2O business model.
Planning advertising mail into an integrated campaignRachel Aldighieri
- New tool-new insight puts mail at the heart of the media ecosystem by applying the same metrics used for other media channels like reach and dwell time.
- It creates a new understanding of how factors like consumer mood, location, and concurrent behaviors impact consumer experience and commercial returns.
- The insights show mail is well-suited for advertising because people spend significant dwell time with it in relaxed settings at home, finding it informative, memorable, and not intrusive.
This document discusses nutrition and physical activity. It emphasizes the importance of eating healthy foods like fruits and vegetables, staying hydrated by drinking water, being physically active through various exercises and sports, and making healthy choices when grocery shopping and preparing meals and snacks. A healthy lifestyle incorporates balanced nutrition from the five food groups and regular exercise.
This document explores why the author chose to focus on themselves, Bangkok as a location, and mobile platforms. It lists culture, lower startup costs, lifestyle, and an emerging market as reasons for choosing Bangkok. Mobile is discussed as having no local servers or infrastructure needed, no local payment or banking barriers, popularity of smartphones, and ability to create detached products for mobile platforms.
This document summarizes a social media and SEO event hosted by the DMA. The agenda includes presentations on getting results from social media by Bloom Agency and on SEO by Latitude Digital Marketing. The social media presentation discusses identifying influencers on platforms like Twitter and LinkedIn, using existing customers to find new ones, and trigger-based communications. The SEO presentation focuses on moving beyond silos to a holistic approach across channels. Contact information is provided for the DMA and speakers.
The document provides an agenda and overview for a data protection training seminar. The agenda covers why data protection is important, understanding the key laws around data protection including the Data Protection Act of 1998 and Privacy and Electronic Communications Regulation of 2003. It discusses key terms, the 8 data protection principles, and practical tips for marketers regarding obtaining consent, handling personal data, and complying with regulations. The training aims to help participants understand how to protect personal data, avoid legal issues, and apply data protection best practices in their marketing activities.
This document provides an agenda and summaries for an event on inserts in modern media. The agenda includes welcome and introductions, presentations on why inserts are still relevant, using augmented reality to enhance inserts, effective insert planning tips, the changing face of print, affordable creativity options for inserts, and a closing session. Key points from presentations include that billions of inserts are distributed each year, they can drive higher response rates than advertising, consumers value inserts, and new technologies allow for more customized, interactive, and targeted insert campaigns. Effective planning requires analyzing data, testing options, and considering elements like format, targeting, regional focus. Print is adapting to remain valuable by embracing multi-channel integration and utilizing improved digital printing technologies.
This document provides an overview of using mobile marketing for brands. It discusses the growth of mobile internet usage and how brands can leverage mobile marketing. Some key points:
- Mobile internet usage is growing rapidly as more consumers go online via smartphones and tablets.
- Brands should recognize mobile as a core part of marketing strategy rather than just a supplementary channel. An integrated mobile experience can enhance consumer engagement.
- Various mobile marketing techniques are discussed such as mobile websites, apps, mobile ads, location-based services, and SMS/MMS. Brands can use these channels for branding, advertising, promotions, customer service and more.
- While mobile presents opportunities, brands must consider user experience, permissions, and
There are three main types of creative integration: linear integration, where content is consistent across all channels; nuclear integration, where campaigns are built around a central unifying idea tailored for different channels; and polar integration, where creative content for specific channels is retrofitted to other channels. The document discusses these three types of integration and provides examples to illustrate the different approaches.
MoMo Beijing introduction to thai mobile environment - 14th may 2012momobeijing
This document provides an introduction and overview of the mobile industry and startup opportunities in Thailand. It summarizes Thailand's strong mobile usage statistics, including being one of the most active countries on Foursquare in 2010 and having over 11 million photos uploaded to Instagram. It also discusses Rocket Internet's creation of clone e-commerce websites in Thailand and hiring over 200 employees. Both pros and cons are outlined for Thailand's technology business environment, with pros including an untapped market and cheap workforce, and cons being restrictions on foreign ownership of companies and difficulties finding qualified technical employees and cultural barriers.
The GDPR and its requirements for implementing data protection impact assessm...IT Governance Ltd
This webinar covers:
-The GDPR’s impact and the benefits of conducting a DPIA
-The legal requirements for a DPIA under the GDPR
-High-risk DPIAs and prior consultation with the supervisory authority
-DPIAs and their links to an organisation’s risk management framework
-The practical steps to conduct a DPIA
You can watch the webinar here https://www.youtube.com/watch?v=fm9Ysg4LUQg&t=640s
Changes to EU data protection legislation are imminent and could have potentially devastating consequences for your business. Don’t be caught by surprise!
The DMA is keeping in close touch with developments as the European Parliament and Council prepare to debate this business-critical piece of legislation this autumn.
Caroline Roberts, Director of Public Affairs at the DMA will provide an update on the draft EU Data Protection Regulation and the DMA's lobbying activity.
Kathryn Wynn, Senior Associate at Pinsent Masons will discuss Big Data: Identifying the Opportunities and Overcoming the Legal Obstacles
Private Equity at the Eye of a Perfect Storm: Why Cyber Risk and Regulation M...Iryna Chekanava
An overview of a changing landscape of cyber security and compliance and key challenges it presents for Private Equity and Venture Capital Organisations. It also provides handy advice on what cyber risks should be considered on each stage of an investment life cycle and how to prevent them.
The document discusses how Acronis solutions help organizations comply with the GDPR through features that allow for privacy impact assessments, data access governance, secure backup storage, data breach response, and data deletion in accordance with data subject rights like access, rectification, erasure and portability. It outlines how Acronis Backup, Storage, Backup Cloud and Disaster Recovery Service provide control over data location, strong encryption, easy data access and modification, fast recovery, and logging to meet GDPR requirements.
3rd Party Risk: Practical Considerations for Privacy & Security Due DiligenceResilient Systems
This document provides an overview of 3rd party risk due diligence best practices for privacy and security. It discusses using questionnaires and on-site reviews to assess 3rd party vendors. It also addresses considerations for evaluating foreign service providers, such as the scope of services, data sensitivity, geographic factors, business continuity, local laws, legal risks, and security controls. The document provides examples of key questions to include in a questionnaire and areas to focus on during an on-site review.
Presented by Dr Sam De Silva, partner at Nabarro to over 100 CEOs and Executives in London.
Explains what leaders should do immediately after becoming aware of a cyber attack, from a legal perspective.
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Brian Miller, Solicitor
In a more detailed look at data protection, Vicki Bowles takes a look at the new draft EU Data Protection Regulation, disclosure and BYOD (Bring Your Own Device).
Brian Miller then covers ISO certification, how to check whether your vendor’s systems are secure, how US Safe Harbor worked in practice, how it will do so with the new Privacy Shield and the various certification/accreditation systems for cloud computing vendors.
California Consumer Protection Act (CCPA) is
one such law that empowers the residents of
California, United States to have enhanced
privacy rights & consumer protection. It is the
most comprehensive US state privacy law to
date.
The document provides an overview and agenda for a conference on achieving compliance with the General Data Protection Regulation (GDPR). It discusses key aspects of GDPR compliance including identifying personal data, data subject rights, security requirements, international data transfers, and remedies for non-compliance. Various vendors also present on how their products can help organizations meet GDPR requirements through features such as digital consent management and customizable reporting on personal data. An example case study highlights how one company used DocuSign to address challenges around manual processes, GDPR readiness, and security of personal information.
Being an in house lawyer isn’t just about the law – perhaps it never has been. Every six months at our in house lawyer sessions we give practical training on:
- what the law means for you (personally) and for your business
- tips on what to incorporate into your next contract, your next discussion with the HR department, or your next board meeting.
We’ll also be covering the black letter law:
- employment update - the end of tribunal fees and spying on job applicants
- commercial and data protection law - changes in contract law and in particular how to get your contracts in shape for the General Data Protection Regulation (GDPR) – the wording, the principles and the practice
- reputation law and practice – in the event of a cyber-attack, fire, fraud, death or scandal – how do you manage the media frenzy? Having advised on a range of these matters we’ll be looking at the legal and practical issues with managing the media and we'll also be joined by an expert PR consultant.
Kerry Mickelson from Marcum LLP presented on the importance of conducting regular IT assessments. The presentation covered topics such as industry best practices, network infrastructure, security, disaster recovery, budget reviews, and compliance. Mickelson emphasized that assessments help identify risks, ensure compliance, and improve business processes. Regular assessments also benefit IT staff by providing coaching to help address any issues.
Fully understand how GDPR affects the life of millions of EU citizens by having in mind the 10 simple facts exposed by Dr. Karsten Kinast
The presentation gives a short glimpse in to the motivation of GDPR, the key changes it brings, and the ongoing compliance on information lifecycle it presumes.
The document discusses preparations for the General Data Protection Regulation (GDPR) which takes effect in May 2018. It provides an overview of key GDPR requirements such as conducting privacy impact assessments, obtaining explicit consent, data breach notification, and appointing a Data Protection Officer. The presentation recommends organizations undertake a data discovery and gap analysis to assess compliance needs. Penalties for non-compliance under GDPR are also highlighted.
The document discusses key aspects of preparing for and complying with the EU General Data Protection Regulation (GDPR), which goes into effect on May 25, 2018. It outlines some of the major changes and requirements introduced by the GDPR, including its expanded territorial reach, new obligations for data processors, strengthened consent requirements, increased penalties for non-compliance, and the role of supervisory authorities. The document emphasizes that organizations must conduct assessments, secure resources and budgets, and implement technologies and processes to ensure they have a defensible position and are prepared to address the challenges and opportunities created by the GDPR.
As in house lawyers you’re ultimately responsible for the reputation of your business. This update seminar looked at various areas of law and at your role in protecting that reputation in the following areas:
- Data Protection – now that GDPR and (just in time) the Data Protection Act 2018 is in force – what have we seen since implementation? What does the recent case law and last minute ICO guidance tell us about how to deal with data? How can you best protect and prepare your business for data breaches. How should you best deal with suppliers, sub-contractors and others in order to keep your business out of the headlines?
- Employment – dealing with reputational risk and contractors, IR35 and self-employment. What do you need to do, to do right by your employees and contractors?
- Influencer marketing – with social media 'influencers' and 'brand ambassadors' being the latest in marketing ploys – what do agreements with them look like and what risks do they pose to you as a brand and under advertising law and data protection legislation?
- Vicarious liability – following the Barclays case – when are you liable for people who do work for you – whether or not they are employed by you?
- Public/private engagement – based on research by CBI and in the light of the recent changes - how best can private business engage with public sector opportunities? Where’s the reward and what’s the risk – should you be looking at this area?
Implementing and Auditing General Data Protection RegulationJim Kaplan CIA CFE
This document provides an agenda and overview of a webinar on lessons learned from the General Data Protection Regulation (GDPR) and applying the GDPR's data protection principles. The webinar agenda includes discussing common data security failures, managing personal data breaches, and the seven data protection principles. It also provides background on the webinar presenter and introduces the company hosting the webinar, AuditNet.
GDPR is the most significant change to data protection in a generation and an imminent global issue that will dominate data privacy, management and regulation discussions in 2017. According to recent research, over half of businesses lack preparedness for GDPR. With a quarter of the EU’s grace period over and with fines of up to €20 million (or 4% of global turnover), there is a lot at stake for companies falling behind the May 2018 deadline. So, where do you start?
Join renowned information security consultant and GDPR expert, Brian Honan, along with Tim Erlin, Senior Director, Security and IT Risk Strategist at Tripwire as they walk you through the essential steps to accelerate your GDPR preparedness.
In this session you will learn:
• The key facts about the GDPR regulations
• The implications of the new rules and how they will impact your business
• Practical steps your business can take to prepare
• How your existing security frameworks (ISO/NIST/CSC) can help set the foundation
• How Tripwire can help
This document outlines the agenda for a conference on navigating B2B marketing and insights into marketing automation. The agenda includes presentations on the topics of focusing on technology over content, evaluating content quality, considerations for marketing automation implementations, and a panel discussion. Presenters will discuss lessons learned, common challenges with marketing automation projects, and strategies for overcoming barriers between marketing, sales, and IT departments. The event aims to provide reflections on marketing automation and collaborative marketing applications from industry experts.
Taking the lead: customer acquisition barometer 2015Rachel Aldighieri
This document summarizes a presentation on customer acquisition strategies. It discusses key findings from research on how consumers prefer to be contacted by companies compared to how marketers currently engage consumers. There is a preference gap shown between these two. The presentation also shares results from a fantasy football marketing campaign that engaged fans by tapping into the insight that many fans will select players for their fantasy team that are not actually on the real team they support. This campaign helped drive significant growth in registrations and engagement through leveraging an understanding of fan behaviors. The document concludes with a panel discussion on effective acquisition strategies.
The value of mail: what planners and marketers need to knowRachel Aldighieri
This document appears to be a presentation on the value of direct mail from Royal Mail MarketReach. It summarizes the key points as:
1) Direct mail provides valuable access to time and place, allowing messages to reach consumers when and where they are most receptive.
2) Great creative that defines a brand can give commercial advantage to direct mail over other channels.
3) Integration of direct mail with other channels, such as TV, can significantly increase campaign effectiveness and drive consumers along purchase journeys.
The document outlines a social media event held by DMA House on sharpening social media skills. It includes an agenda for the day with presentations on keeping social media campaigns legal, maximizing engagement, analyzing social media data, and a panel discussion. One presentation provides details on legal requirements for social media marketing under the CAP Code and CPRs, and highlights recent cases related to promotions, endorsements, and third-party content. Another presentation discusses best practices for understanding audiences, objectives, channels and using search and SEO to improve engagement.
Stop selling and start serving: how to bring data, creativity and technology ...Rachel Aldighieri
The document summarizes key points from a conference on combining data, creativity and technology. It discusses how understanding customer journeys is important to provide personalized experiences across interactions. It notes businesses often provide disjointed and impersonal experiences. A presentation discusses recognizing anonymous customers, understanding their journeys through different interactions, and continuing conversations across channels. Another talk outlines finding the "data and creative sweet spot" by using data inputs up front as a springboard for creative ideas while allowing freedom in execution. The document concludes with closing comments from the conference chair.
This document summarizes a legal update meeting on the EU Data Protection Regulation. The meeting agenda included presentations on the future of the EU Data Protection Regulation and how it will impact direct marketing practices. Key points from the presentations include:
- The current EU Data Protection Directive is outdated and a new Regulation is being negotiated that would impose stricter consent requirements, rights for individuals, and sanctions for non-compliance.
- Explicit consent may be required for all data processing and marketing under the new Regulation.
- Individuals may have new rights like "the right to be forgotten" and easier access to their personal data.
- Businesses need to prepare for potential fines of up to 2% of global annual turnover for violations
The document provides an overview of a data protection seminar, including:
- The agenda which covers understanding data protection law, practical tips for marketers, and a question period.
- An introduction to why data protection is important for protecting information, avoiding reputational damage, making good business sense, and avoiding enforcement actions.
- A summary of the key aspects of the Data Protection Act 1998 and Privacy and Electronic Communications Regulation 2003, including definitions, principles, and rules regarding marketing communications.
- Practical tips for marketers regarding data capture, obtaining permissions, and regaining lost permissions in compliance with regulations.
The document summarizes the FEDMA Legal Fact Pack 2015, which provides information on direct marketing laws for 31 countries. It contains country fact sheets on rules for direct mail, email, telemarketing, and data protection. The fact pack is an important resource for direct marketers to understand legal requirements and promote ethical practices. FEDMA publishes the fact pack to help direct marketers comply with regulations and develop self-regulation standards for the industry.
This document summarizes a meeting that discussed European legal and privacy updates for data-driven marketing. It included presentations from the CEO of DMA Group and the co-chair of FEDMA on different privacy views in Europe and the need for proportionate and effective regulation through dialogue between industry and policymakers. Other topics discussed were the Data Protection Regulation's impact and how to prepare for the new law, including assessing what constitutes personal data, consent mechanisms, legitimate interest, and profiling activities. The future of marketing and why the industry should care about developments in Europe were also mentioned.
This document provides an agenda and details for a workshop on preparing entries for the DMA Awards. The workshop covers best practices for presenting creative work, strategy, and results in award submissions. Speakers will discuss how to effectively showcase strategy, creative, and results, as well as tips for choosing appropriate categories and the judging process. Attendees are encouraged to enter their work and take advantage of the opportunity for recognition, business development, and to showcase their marketing excellence.
This document provides an agenda and overview for an event on best practices for presenting creative work, strategy, and results for the DMA Awards. The event will include presentations on how to effectively showcase creative work, strategy, and results. It will also cover which award categories to consider entering and provide an overview of the judging process. The goal is to help attendees develop strong award submissions that represent their best work in the most favorable light.
The document discusses the state of British copywriting based on the perspective of Mark Runacus, chair of the DMA Awards committee. It notes the large volume and quality of entries in recent DMA Awards. It then outlines a census of writers to understand their views on their work and industry. Writers expressed that they enjoy their work but fear for the future due to issues like clients and new technology. The document criticizes how the industry has abandoned copywriting in favor of "marketing-speak" and lack of character or message in writing. It encourages writers to have an interesting message rather than "shut the fuck up" if they have nothing to say.
Data detailed: how to buy and sell information responsibly - 08.07.2015Rachel Aldighieri
This document summarizes an event about responsible data practices in buying and selling information. The agenda includes welcome remarks, presentations on data challenges and managing the data value chain, and a client's perspective on buying data. A panel discussion follows with representatives from the Direct Marketing Commission, Opt-4, DataTalk, and Barclays Bank. The event concludes with closing comments.
This document summarizes a legal update event held by the DMA (Direct Marketing Association) on data protection. It includes:
- An agenda for the day covering upcoming changes to EU data protection laws and their implications for direct marketing.
- A summary of proposed changes in the EU's draft Data Protection Regulation, including stricter consent requirements, increased data subject rights like the "right to be forgotten", and heavier sanctions for non-compliance.
- An analysis of how these changes may impact direct marketing practices, such as the need to obtain explicit consent, review existing databases and consent language, and increase compliance costs.
Data privacy: what the consumer really thinks - 30.06.2015Rachel Aldighieri
This document summarizes a conference on data privacy held by the DMA UK. The agenda includes welcome remarks, presentations on research into consumer attitudes towards data privacy and case studies. A panel discussion will be held with representatives from Acxiom, Future Foundation, Wunderman, and Time Inc. discussing topics like the trends in how consumers view data sharing and incentives for sharing data. The conference aims to explore how consumer views on privacy are evolving and discuss how companies can build trust with consumers in an age of increased awareness of data use.
An introduction to data protection - Manchester - 24/06/15Rachel Aldighieri
This document provides an agenda and overview for a data protection seminar. It discusses:
1. Why data protection is important for protecting information, avoiding reputational damage, and avoiding legal penalties.
2. An overview of the key UK data protection laws: the Data Protection Act 1998 and the Privacy and Electronic Communications Regulation 2003. It defines important terms, outlines the 8 data protection principles, and reviews key rules around electronic communications.
3. Practical tips for marketers on capturing data, obtaining permissions, sourcing data from third parties, and regaining lost consent.
An Introduction to Data Protection (London) - June 2015Rachel Aldighieri
The document summarizes a presentation on data protection laws given by Janine Paterson. It covered why data protection is important, key terms in data protection law like personal data and sensitive personal data, the 8 principles of the Data Protection Act 1998, and key rules of the Privacy and Electronic Communications Regulation 2003. It provided practical tips for marketers on topics like obtaining consent, sourcing and updating data, and regaining lost permissions.
Introduction to data protection - Edinburgh - 29/04/15Rachel Aldighieri
This document provides an overview of a data protection seminar. It discusses:
1. Why data protection is important for protecting information, avoiding reputational damage, and avoiding legal penalties.
2. Key aspects of the UK's Data Protection Act (1998) and Privacy and Electronic Communications Regulation (2003) including definitions, principles, and rules regarding electronic communications.
3. Practical tips for marketers regarding obtaining consent, maintaining marketing permissions, sourcing data, and regaining lost consent.
In search of the perfect customer journey - ManchesterRachel Aldighieri
This document summarizes a conference on mapping the customer journey in a multi-channel world. It discusses 3 key learnings: 1) examine customer journeys from the customer's perspective, 2) build journeys around emotional needs, and 3) ensure accountability for customer experience. It also notes that customer behavior has changed and journeys must reflect complex, multi-channel behavior. Successful companies bust silos, measure what matters, consider their people, and lead with their brand and customer.
The document discusses the key topics around big data and data protection that were covered at a legal update event, including:
1) How the principles of data protection (such as fair processing, data minimization, and security) apply to big data, which can involve large and varied datasets.
2) Issues around obtaining valid consent for big data uses or relying on legitimate interests, as well as complying with the data retention principle.
3) How the research exemption may apply to some big data activities for commercial purposes like market research.
4) Potential impacts of the proposed EU Data Protection Regulation on big data, such as strengthened individual rights and compliance obligations for organizations.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
2. Connect with the DMA…
• The #tag for this event is: #dmalegal
• LinkedIn: DMA: Direct Marketing Association (UK)
Limited
• Twitter: @DMA_UK/ @DMANorth
• DMA Website: http://www.dma.org.uk
• Email: dma@dma.org.uk or events@dma.org.uk
• Phone: 020 7291 3300 or 0161 918 6780
3. Today’s agenda
• 09.00 – 09.30 Registration and Coffee
• 09.30 – 09.35 Welcome and Introduction
• 09.35 – 10.05 Data Protection Regulation
– Richard Parkinson, Legal Director Pinsent Masons and
Samantha Livesey, Partner, Pinsent Masons
• 10.05 – 10.35 Data Protection Regulation
– Caroline Roberts, Director of Public Affairs, DMA and James
Milligan, Solicitor, DMA
• 10.35 – 10.55 Refreshment Break
• 10.55 – 11.15 Cookies – New Privacy Regulations
– James Milligan, Solicitor, DMA
• 11.15– 11.30 Hot Industry Issues
– Caroline Roberts, Director of Public Affairs, DMA and James
Milligan, Solicitor, DMA
• 11.30 – 12.00 Panel Debate and Close
4. The Proposed New EU Data
Protection Regulation
Samantha Livesey and Richard Parkinson
5. Agenda
1. Introduction
2. Timescale
3. Headline proposed changes
4. Summary of main changes from current regime
5. Some specifics + considerations for compliance
8. From proposal to law: legislative process
to implementation
Committee stage:
Draft report published: Jan to April 2013
Nov 2012
Lead committee
Parliamentary
vote: April 2013
Hearings: amendments to text:
May to Nov 2012 Dec 2012
Q1. 2014?
May 2012 December 2012 April 2013 2014
10. Headline proposed changes
• Data processors directly covered
• Expanded definitions: “personal data” and “data subject”
• Explicit consent required
• Right to be forgotten
• Greater emphasis on accountability
• Notification of data security breaches
• More onerous sanctions for breach
11. Consent
Consent: Current Position Consent: Proposed Position
- Freely given, specific, informed -Freely given, specific, informed and explicit
indication of the data subject’s indication of data subject’s wishes
wishes
- Given either by a statement or a clear
- Explicit consent required for affirmative action
sensitive personal data only
- Data controller / data subject relationship to
be taken into account
- Burden of proof on controller to
demonstrate consent
12. Greater accountability
• Public bodies / companies <250 staff
• Appointment of DP officer
2 year appointment
independent reporting to board
inform
train
• Maintenance of documentation
• Data protection impact reports
13. Data security breach notification
• Mandatory notification
• Within 24 hours of becoming aware of breach
• Report to cover:
nature of breach
number of data subjects
categories of data
proposed mitigation
14. Data security breach roadmap
INCIDENT: NOTIFY: ALERT: INVESTIGATE
INVESTIGATE
A data security Notify Insurer Involve your : Find out what
Find out what
incident occurs immediately security breach happened
happened
response team
NOTIFY
ICO
WITHIN
24
HOURS
EVALUATE: RESPOND:
RESPOND: ASSESS:
ASSESS: CONTAIN:
CONTAIN:
How successful Complete your
Complete your What are the
What are the Prevent/limit any
Prevent/limit any
was the security breach
Incident potential
potential further data loss
further data loss
response? Response plan
response Plan consequences?
consequences?
15. Proposed enhanced sanctions
• Depend on:-
Size of organisation involved
Nature and gravity of breach
Whether intentional or negligent
Technical and organisational measures
Previous breaches
Co-operation with ICO
16. Proposed enhanced sanctions
• Up to €250k or 0.5% annual worldwide turnover
intentional or negligent failure to operate a proper subject
access request
• Up to €500k or 1% annual worldwide turnover intentional
or negligent failure to respond to subject access requests
in accordance with Regulation
• Up to €1m or 2% of annual worldwide turnover for other
compliance failures
17. Winners Losers
Data Protection Officers Data processors
Data subjects?
Genuinely better protection for them? Data subjects?
Multinational businesses seeking to Consumers: Increased burden and
operate in a genuinely single cost of compliance passed on
European market
The (few?) national supervisory Other national supervisory authorities:
authorities likely to receive increased increased duties; same resources
funding
Initiatives for information sharing on The many industries that operate
cyber/data security incidents: both using “indirectly identifiable data”
industry groups and government (or in the “grey zone”)
22. Draft EU Data Protection
Regulation
DMA View and Lobbying
Activity
Caroline Roberts James Milligan
Director of Public Affairs DMA Solicitor
23. Draft Regulation
- DMA View
• DMA welcomes the Commission’s aim to reduce red tape
and simplify bureaucracy – but proposals do not achieve
that: overly strict, bureaucratic and unworkable
• Needs to be a fair balance between privacy and legitimate
business interests
• Current proposals will stifle innovation, add considerably to
business costs and place unnecessary obstacle to e-
commerce jobs growth
• Will be particularly harmful to SMEs
• Hard to say how Commission’s estimate of 2.3 billion euros
saving to businesses was calculated
24. “The proposed EU Data Protection Regulation
could cost the UK £47 billion in lost sales
According to the businesses polled for the study,
the proposed EU legislation could cost UK each
an average of £76,000.
Crucially, if these results were representative of
the UK economy as a whole, this would translate
into a potential cost of £47 billion to UK
businesses, concentrated amongst mainly
SMEs.”
25. Key points in the draft Regulation
Opt-in and opt–out - obtaining consent
• General rule for direct marketing – “explicit consent by
clear statement or affirmative action” .
• Possible legitimate interests exemption ?
• Legacy databases – what about data collected under
current law?
• At odds with existing rules on voice calls, email and
SMS marketing
26. Key points in the draft Regulation
IP addresses and cookies
• Definition of personal data extended so could cover some IP
addresses and cookies
• But IP addresses identify a device not an individual + some
IPs are general
• Huge implications for digital marketers
• Web analytics & profiling made much more difficult, if not
impossible
• Interaction with new cookie rules
27. Key points in the draft Regulation
The right to be forgotten
• Right for individuals to request organisations to delete any
information held on them
• Drafted with social media in mind – but goes beyond this
• Problem of information which has already been passed on to
third parties
• Possibility of misleading consumers by raising unrealistic
expectations
• Suppression files.
28. Key points in the draft Regulation
Subject Access Requests
• Data subjects to be able to request full information on data
held on them free of any charge
• Currently can levy a £10 fee – doesn’t cover cost but deters
time-wasters, frivolous or vexatious requests.
• Costs organisations £50 million p.a. now to meet SARs
• Proposal that can provide data in electronic form if data
subject agrees to this
29. Key points in the draft Regulation
- Marketing to Children
• General rule – parental consent required for under 18’s
• Exception for online marketing to children above age of 13
• No flexibility – a risk-based approach would be better.
30. Key Points in the draft Regulation –Delegated
Acts
• A major concern is that much of the detail of the Regulation
will be implemented through additional delegated legislation –
some 45 Delegated Acts are mentioned.
• Details of this secondary legislation will not be clear until
Regulation passed
• These areas of secondary legislation will include:
• powers to specify further procedures
• technical standards for Privacy by Design/Default
• specification of lawful processing condition
• additional responsibilities for national data protection
authorities; etc.
• European Commission will be taking significant powers to
itself away from the national authorities - raises serious issues
of subsidiarity and accountability
31. Current position - UK
• Government reshuffle
• at MoJ Helen Grant replaces Lord McNally.
• MoJ Data Protection Advisory Panel
• DMA invited to join
• Justice Select Committee enquiry
• DMA submitted evidence
• 3 oral hearings ICO, Minister, FSB, Privacy
International, Microsoft, Which?
• Focus on bureaucratic burdens, benefits of
harmonisation, Right to be Forgotten
• Report in October to EU Scrutiny Committee
• Allies
• CBI; Federation of Small Business; Which? etc.
• DMA Research
• Data Privacy: What the Consumer Really Thinks and
on the economic value of the dm industry, Putting a
Price on Direct Marketing
32. Current position – UK Data Group
• DMA chairing industry group under Advertising Association
umbrella - to co-ordinate lobbying efforts
• + ISBA, IPA, MRS, IPM, Sky, ITV, Channel 4, Microsoft,
Google, Facebook
• Ministerial Round Table on 23rd October
• Set of draft amendments to propose
• Priorities agreed: definition of personal data; profiling; consent;
impact on small businesses; compliance costs
• Mapping exercise of key individuals to target – pooling of
intelligence on lobbying outcomes
33. Current position – Brussels –
Council of Ministers
• Council of Ministers Working Group meeting
monthly
• Initial reports indicate UK Government (and
others) taking a helpful and business-friendly
stance – many object to delegated acts; find it
too prescriptive and blunt in outlook on risk
and harm & would prefer a more principles-
based approach.
• UK pushing for Directive, rather than
Regulation – as is Germany
34. Current position – Brussels –
European Parliament
• Lead Committee = LIBE
• Civil Liberties, Justice & Home Affairs
• Rapporteur is German Green MEP
• Aiming for Draft Report for discussion in
December with vote in early 2013
• 4 other Committees will produce reports
• ITRE – industry & trade
• IMCO – Internal Market & Consumer Protection
• Juri – Legal
• Employment & Social Affairs
35. Current position – Brussels -
FEDMA
• FEDMA co-ordinating central European effort, a link point for
exchange of intelligence on lobbying outcomes in different
Member States
• Organising meetings in Brussels with key individuals in
Council, Commission and Parliament, e.g. Cypriot Presidency;
advisers to key MEPs; party group secretariats.
• Produced a FEDMA position paper on priorities for industry +
draft amendments to text
• Lobbying directly where there is no national DMA
• DMA participating in Europe-wide group, Data Industry
Platform – for collective lobbying + current research project by
KPMG on likely effect of Regulation on European industry
36. Next steps
• Industry Round Table with MoJ and DCMS Ministers –
23rd October
• Contact key UK MEPs
• Promote suggested amendments to Regulation – to UK
MEPs and via FEDMA to others
•
• Lobby UK political leaders to influence their MEPs in EU
Parliament
• Continue to engage with key Commission, Council and
Parliament civil servants and advisers
37. Timing
• Council Working Party meets on 25/26
September + 4 more meetings in 2012
• 6th December – Council Ministers meet
• LIBE lead EP Committee – meeting with
national parliaments on 9/10 October; will
produce working document in mid-October &
draft report in late November
• Other 4 Committees in parallel
• ???????? 2014.
44. What does the law require?
• The EU's revised privacy and
communications directive came into
force on 26 May 2011
• EU laws have been in place since 2003
clear information requirement.
• The changes in May dramatically
tightened the rules: clear information
and consent from users to store a
cookie on their device.
45. The law doesn’t just cover cookies
• The law isn’t actually about cookies, but because it affects
them so much people have started calling it the ‘Cookie
Law’
• The law covers all technologies which store information in
the “terminal equipment" of a user, and that includes so-
called Flash cookies (Locally Stored Objects), HTML5
Local Storage, web beacons or bugs…and more
• This applies to email and mobile marketing too!
46. In practice
Those setting cookies must:
• tell people that the cookies are there,
• explain what the cookies are doing, and
• obtain their consent to store a cookie on
their device.
47. Two exemptions from consent
requirement
• 1. “use of cookie is for the sole purpose of
carrying out the transmission of a
communication over an electronic
communications network“
• 2. “cookies that are strictly necessary for the
provision of a service”
– e.g. internet banking, online shopping
carts, website log-ins
48. What steps should you have been
taking?
Follow the ICO’s guidelines:
1. Check what type of cookies and similar technologies
you use and how you use them.
2. Assess how intrusive your use of cookies is.
3. Decide what solution to obtain consent will be best
in your circumstances.
49. Check what type of cookies you use
• This might have to be a comprehensive audit of your
website or it could be as simple as checking what data
files are placed on user terminals and why.
• You should analyse which cookies are strictly necessary
and might not need consent.
• You might also use this as an opportunity to ‘clean up’
your webpages and stop using any cookies that are
unnecessary or which have been superseded as your
site has evolved
• And also check that you have identified ALL your
websites.
50. Assess how intrusive your use of
cookies is
• ….It might be useful to think of this in terms of a
sliding scale, with privacy neutral cookies at one
end of the scale and more intrusive uses of the
technology at the other.
• You can then focus your efforts on achieving
compliance appropriately providing more
information and offering more detailed choices at
the intrusive end of the scale.
51. Decide how to obtain consent
• Once you know what you do, how you do it and for what
purpose, you need to think about the best method for
gaining consent.
• The more privacy intrusive your activity, the more you
will need to do to get meaningful consent….
– Pop-up box
– Splash page
– Landing page
– Webpage header, banner or scrolling text
– Through T&Cs for registered website users
• Cannot currently rely on users’ browser settings!
54. Hot Industry Topics
• Consumer Rights legislation
• Marketing to children
• Telemarketing
• Financial services
• Alcohol marketing
• Postal Affairs
• Environment
55. Consumer Law – all change
• UK consumer law is not fit for purpose.
• Outdated language and concepts not
appropriate in age of digital downloads
and international online retail.
• To help consolidate and simplify
consumer law for the benefit of
consumers and traders, the
Government has launched three
consultations.
56. 1. Consumer Rights Bill
• BIS consultation proposes a range of options to clarify the rights
and remedies for goods and services, including digital content,
including:
• Replace the current system of implied terms with a clear set
of statutory guarantees when purchasing goods
• Set a clear time limit for a short term right to reject
• Clarify the number of times a retailer can repair sub-
standard goods before being obliged to replace them
• Replace “reasonable care and skill” with statutory
guarantees for service levels
• Introduce statutory remedies for sub-standard services
• Clarify the rights and remedies available when buying digital
content.
• If implemented, these changes will see a complete change to how
consumer law protects people when buying goods and services, and
will introduce concepts that will allow for developments in
technology.
• This consultation closes on 5 October
57. 2. Unfair terms in consumer contracts: a
new approach
• Current law on unfair terms in consumer contracts
contained in two pieces of legislation which have their
own inconsistencies and overlapping provisions.
• As part of consultation on package of measures to
simplify and consolidate consumer law, the Law
Commissions asked to review and update 2005 report
in relation to its general consumer recommendations.
• Also asked to look at one specific issue: Which terms in
a contract should be excluded from any rules? (has
arisen from 2009 litigation over bank charges)
• Their advice to be published spring 2013.
• Consultation looks at recommendations in 2005 report
and updates some proposals in light of changes since.
• The consultation closes on 25 October.
58. 3. Implementation of the Consumer Rights
Directive
• Agreed by the European Commission in 2011 – into UK law
by April 2014.
• Focused on harmonising and simplifying rules in a few key
areas of consumer law:
• Information that must be given to a consumer before s/he
buys goods or services on a trader’s premises
• Information that must be given to a consumer before s/he
buys goods or services away from a trader’s premises, for
example a fair, or at a distance (eg online)
• Cancellation rights and responsibilities when a consumer
buys goods or services away from a trader’s business
premises or at a distance
• Delivery times for goods and where responsibility lies if
there is a problem
• Post-contract helplines – these now cannot be a premium
rate but can only be a basic rate call
• Additional payments – these are payments that are charged
on top of the price of the goods or services. They now need
to have active or express consent so pre-ticked boxes will
no longer be allowed
• Payment fees (eg credit card surcharges).
59. Consumer Rights Directive – UK implementation
• Payment fees are also subject to a separate consultation,
issued by the Department for Business Innovation and Skills
on 3 September
• Many of the provisions of the Consumer Rights Directive have
to be implemented as agreed in Europe but the consultation
looks at some areas where there is leeway in how the UK
Government implements the provisions. These include
applying the provisions to sectors exempted by the Directive,
for example healthcare and social services, setting a minimum
value for a transaction to be subject to the provisions and
dealing with emergency repairs in the home.
• Aims to put an end to certain bad business practices and help
consumers make well informed decisions when buying
products or services.
• Also to boost business confidence, setting out clearer rules
and responsibilities and cutting red tape by reducing
compliance costs.
• Consultation closes on 1 November.
60. Marketing to children
• General political concern about over-commercialisation
• Bailey Review on Commercialisation and Sexualisation of
Childhood – “Letting Children Be Children” - report
published 2011
• Says role and practice of advertising in broadly good
shape – praises industry initiatives, e.g. CHECK
• 5 key recommendations:
• Sexual imagery on billboards, magazine covers.
• No under-16 brand ambassadors & peer to peer
techniques
• Harmonisation of the age of a child at 16
• Website for parents to complain
• Improving industry and regulatory understanding of
parental concerns
61. Marketing to children – industry response
• Children’s Panel set up to monitor advertising to children and
take forward issues of concern
• Parent Port – gateway portal for parents for information,
advice, complaints, etc.
• Research - Credos, Advertising Association think tank
• UK Brand Ambassador and Peer-to-Peer Marketing Pledge:
• Agreed principle that
“ Young people under the age of 16 should not be
employed directly or indirectly paid or paid-in-kind to
actively promote brands, products, goods, services,
causes or ideas to their peers, associates or friends”
• 30+ national company signatories + 13 trade associations,
including DMA
• Industry awareness campaigns
62. Marketing to children- latest developments
• Consultation on extending age rating system to
music DVDs and Blu-rays
• Govt encouraging industry to introduce clear
warnings on explicit videos online
• Govt finalising legislation to implement the new
classification system for video games
• Govt asking ASA to consider whether more
should be done to spell out commercial intent of
advergames to young people and parents
63. Telemarketing
OFCOM issued consultation 4th April on Simplifying Non-
geographic Numbers - detailed proposals on the unbundled
tariff and Freephone
• Non-geographic numbers include 03, 080, 0845,0870, 083/4,
0871/2/3, 09 and 118 numbers.
• Used to call businesses and Government agencies, to get
information, make payments for services and vote on TV
shows. Nearly every consumer and every company in the
country uses these numbers in some way.
• Confusion about the price – even freephone not clear cut
• Concerns about revenue sharing.
64. Telemarketing
• Main proposals:
– Freephone: (080 and 116 numbers) to be free from all
telephones, landline and mobile;
– 03: to become the only non-geographic number range
linked to the price of a call to a geographic number (i.e.
the 01/02 number ranges);
– Revenue sharing ranges: (084, 087, 09 and 118
numbers -where a portion of the retail charge is passed
back to the receiver of the call) are to have a common
simplified structure.
• Consultation closed 27th June 2012 – now awaiting
Government’s response
65. Financial Services
• EU Gender Directive
– In force 21st December 2012
– ECJ ruled 1st March 2011 that gender sensitive pricing
is contrary to the principle of equal treatment in EU
law
– Therefore gender neutral pricing will become the norm
- Unisex premiums would see the lower-risk gender
paying more to subsidise the high-risk gender
66. Financial Services
• Re- architecture of financial services regulatory
environment
• Replacement of FSA by Financial Conduct
Authority and Prudential Regulatory Authority
• Banking Reform Bill – ring fencing of retail and
investment arms within banks included in
Queen’s Speech 2012.
67. Financial Services – consumer credit
• Consumer Credit in limbo- move to FCA?
– Investigations into payday loans and payment
protection insurance have raised the issue of
standards in the consumer credit market
– BIS Committee of MPs has called for tighter controls
on debt management companies and payday
lenders
• Charge higher licensing fees for higher risk
credit businesses
• Put in place a fast track procedure to suspend
credit licences
• Give the regulator the power to ban harmful
products
68. Financial Services – consumer credit
• BIS Consultation on the Early
Implementation of a Ban on Above Cost
Payment Surcharges
• Credit/Debit Card charges
• Consultation closes 15 October 2012.
69. Alcohol
• Government issued its Alcohol strategy on 23rd March
• Focus on pricing issues
• Minimum pricing in Scotland to be introduced –
implications for rest of UK?
• Positive comments on the work of self-regulation
• Commons Health Select Committee holding an inquiry
into the Governments’ proposals, looking at:
– effects of marketing on alcohol consumption, in particular
in relation to children and young people.
– international evidence of the most effective interventions
for reducing consumption of alcohol and evidence of any
successful programmes to reduce harmful drinking, such
as: education; reduction in strength; raising legal drinking
age; and plain packaging and marketing bans.
70. Postal issues
• Reversions issue with Royal Mail
• DMA in discussions with RM to secure a more
beneficial outcome – hosted summit in August
• Making progress
• VAT – single supply of services
71. Environment
• The DMA and Defra signed a Responsibility Deal in 2011.
• Part of this was the introduction of a new website where
householders can opt-out of receiving all types of advertising
mail.
• Aim to reduce the amount of unwanted advertising mail put
through the letterbox
• Doorstop Preference Service is ready to launch – awaiting
final Defra input and agreement with newspaper and
directories industries.
72. Queen’s Speech 2012
• DEFAMATION BILL – end to libel tourism and protection for
website operators for user generated content on their site
provided they comply with new dispute resolution procedures
to allow complainant to deal directly with the author
• ELECTORAL REGISTRATION AND ADMINISTRATION BILL
– introduction of individual electoral registration and system
opened up for digital application. - edited version of register
will be kept but issue on opt-outs.
• ENTERPRISE AND REGULATORY REFORM BILL – aims to
cut red tape
• PENSIONS BILL – creating a single tier pension and bringing
forward increases to the state pension age
• DRAFT COMMUNICATIONS DATA BILL – dubbed “The
Snoopers’ Charter”
73. Any Questions?
james.milligan@dma.org.uk caroline.roberts@dma.org.uk
020 7291 3347 020 7291 3346
DMA members can contact DMA Legal Department for free advice:
by email: legaladvice@dma.org.uk
or call: 020 7291 3360
74. Thank you…
Presentations will be emailed to you Monday
A final thank you to all of today’s speakers:
Richard Parkinson, Pinsent Masons
Samantha Livesey, Pinsent Masons
Caroline Roberts, DMA
James Milligan, DMA
75. Please return your completed
evaluation forms and badges to the
registration desk we look forward to
seeing you again!