SlideShare a Scribd company logo
Introduction
Master Class 8
Privacy & regulatory issues in Internet
Josep Bardallo
2
NetworkingServices&infr.//MasterinICTStrategicManagement
NSI– MSISM 1st Edition 20 / 11 / 2012Josep Bardallo
Privacy
Privacy is the ability of an individual or group to seclude themselves or
information about themselves and thereby reveal themselves selectively.
Privacy is the ability of an individual or group to seclude themselves or
information about themselves and thereby reveal themselves selectively.
3
NetworkingServices&infr.//MasterinICTStrategicManagement
NSI– MSISM 1st Edition 20 / 11 / 2012Josep Bardallo
Internet Privacy
4
NetworkingServices&infr.//MasterinICTStrategicManagement
NSI– MSISM 1st Edition 20 / 11 / 2012Josep Bardallo
Internet Privacy threats
5
NetworkingServices&infr.//MasterinICTStrategicManagement
NSI– MSISM 1st Edition 20 / 11 / 2012Josep Bardallo
Internet Privacy threats
6
NetworkingServices&infr.//MasterinICTStrategicManagement
NSI– MSISM 1st Edition 20 / 11 / 2012Josep Bardallo
Internet Privacy threats
7
NetworkingServices&infr.//MasterinICTStrategicManagement
NSI– MSISM 1st Edition 20 / 11 / 2012Josep Bardallo
Data Breach
8
NetworkingServices&infr.//MasterinICTStrategicManagement
NSI– MSISM 1st Edition 20 / 11 / 2012Josep Bardallo
Data Breach
9
NetworkingServices&infr.//MasterinICTStrategicManagement
NSI– MSISM 1st Edition 20 / 11 / 2012Josep Bardallo
Data Breach (this month)
10
NetworkingServices&infr.//MasterinICTStrategicManagement
NSI– MSISM 1st Edition 20 / 11 / 2012Josep Bardallo
Internet Regulation
11
NetworkingServices&infr.//MasterinICTStrategicManagement
NSI– MSISM 1st Edition 20 / 11 / 2012Josep Bardallo
Compliance: Other regulations
 Cloud Providers must have Audit certifications (like SAS
70)
 Some ISO about Security (ISO 27000), Service
Managent (ISO 20000) or Business continuities
 Vertical regulations like SOX, NIST, PCI, FISMA, HIPAA,
GMP, ….
 New regulations in Cloud like Trusted Cloud Initiative ..
 Country Specific regulations (LOPD, Privacy Act…)
 ……..
12
NetworkingServices&infr.//MasterinICTStrategicManagement
NSI– MSISM 1st Edition 20 / 11 / 2012Josep Bardallo
Regulation in Internet / cloud contracts
 From CSA (Cloud Security Alliance)
 Confidentiality
 Intellectual property (IP)
 Responsibility
 How to cancel contract before time
 Privacy, law in the contract
 Audit and tracking
 Security
 SLA (Service Level agreement)
13
NetworkingServices&infr.//MasterinICTStrategicManagement
NSI– MSISM 1st Edition 20 / 11 / 2012Josep Bardallo
Regulation in Internet / Cloud contracts
 From ENISA (european Network and Information
Security Agency)
 Data Privacy
 Confidentiality
 IP (Intellectual property)
 Negligence
 Outsourcing of services or part of services
14
NetworkingServices&infr.//MasterinICTStrategicManagement
NSI– MSISM 1st Edition 20 / 11 / 2012Josep Bardallo
Regulation in Internet / Cloud contracts
 From INTECO (Instituto nacional tecnologias de las
comunicación)
 SLA
 Uptime
 Performance
 Security
 Payment
 End of service
 Support services
 Modification of service
 Privacy and regulation
15
NetworkingServices&infr.//MasterinICTStrategicManagement
NSI– MSISM 1st Edition 20 / 11 / 2012Josep Bardallo
Important Spanish Laws in Internet / eCommerce
 LSSI / CE (59/2003)
 Propietary, address, CID … visible in the web if selling services in Spain
 User must accept the receipt of commercial information
 Service condition defined in the web
 ISP must retain 2 years of information about user navigation
 Content responsibility
 …
 LOPD (15/1999)
 LPI (Intellectual property)
 LGT (Telecommunications)
16
NetworkingServices&infr.//MasterinICTStrategicManagement
NSI– MSISM 1st Edition 20 / 11 / 2012Josep Bardallo
Spanish Laws
17
NetworkingServices&infr.//MasterinICTStrategicManagement
NSI– MSISM 1st Edition 20 / 11 / 2012Josep Bardallo
Spanish Laws
18
NetworkingServices&infr.//MasterinICTStrategicManagement
NSI– MSISM 1st Edition 20 / 11 / 2012Josep Bardallo
VIDEO
 ACTA / SOPA : New regulation in Internet
http://www.youtube.com/watch?v=NXhIktkK78s&feature=youtu
19
NetworkingServices&infr.//MasterinICTStrategicManagement
NSI– MSISM 1st Edition 20 / 11 / 2012Josep Bardallo
Bibliography
 http://www.privacidad-online.net/
 http://www.abc.net.au/lateline/content/2012/s3583016.htm
 http://www.iitr.us/data-protection-in-dubai-the-difc-data-protection-law.html
 http://www.enriquedans.com/2012/11/realmente-existe-la-privacidad.html
 http://dilbert.com/blog/entry/the_privacy_illusion/
 http://gigaom.com/2012/11/13/government-surveillance-on-the-rise-says-new-google-report/
 http://news.cnet.com/8301-31921_3-57402143-281/ten-worst-internet-laws-of-2012/
 http://www.cyberwarnews.info/2012/11/11/amazon-uk-hacked-600-credentials-leaked-by-darwinare/
 http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=ponemon
 www.agpd.es
 www.enisa.org
 www.csa.org

More Related Content

What's hot

Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
Zeshan Sattar
 
Data Masking: Testing with Near-real Data
Data Masking: Testing with Near-real DataData Masking: Testing with Near-real Data
Data Masking: Testing with Near-real Data
TechWell
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SMCarlos Valderrama
 
FIDO, Federation & Facebook Social login
FIDO, Federation & Facebook Social loginFIDO, Federation & Facebook Social login
FIDO, Federation & Facebook Social login
FIDO Alliance
 
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
FIDO Alliance
 
OpenChain Third Monday Work Team Call Agenda 2020-02-17
OpenChain Third Monday Work Team Call Agenda 2020-02-17OpenChain Third Monday Work Team Call Agenda 2020-02-17
OpenChain Third Monday Work Team Call Agenda 2020-02-17
Shane Coughlan
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
FIDO Alliance
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
scoopnewsgroup
 
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIFVerifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Evernym
 
Odoo iot box integration
Odoo iot box integrationOdoo iot box integration
Odoo iot box integration
Celine George
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
sajid mehmood
 
The FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsThe FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and News
FIDO Alliance
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud Security
Block Armour
 
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar
FIDO Alliance
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
LINE Corporation
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
ForgeRock
 
Layer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load TargetLayer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load TargetPrathan Phongthiproek
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
FIDO Alliance
 
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) USKim Holm
 

What's hot (20)

Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
 
Data Masking: Testing with Near-real Data
Data Masking: Testing with Near-real DataData Masking: Testing with Near-real Data
Data Masking: Testing with Near-real Data
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
FIDO, Federation & Facebook Social login
FIDO, Federation & Facebook Social loginFIDO, Federation & Facebook Social login
FIDO, Federation & Facebook Social login
 
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
 
OpenChain Third Monday Work Team Call Agenda 2020-02-17
OpenChain Third Monday Work Team Call Agenda 2020-02-17OpenChain Third Monday Work Team Call Agenda 2020-02-17
OpenChain Third Monday Work Team Call Agenda 2020-02-17
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIFVerifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
 
Odoo iot box integration
Odoo iot box integrationOdoo iot box integration
Odoo iot box integration
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
The FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsThe FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and News
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud Security
 
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
 
Layer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load TargetLayer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load Target
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
 

Viewers also liked

M9 cloud & open source
M9 cloud & open sourceM9 cloud & open source
M9 cloud & open sourceJosep Bardallo
 
DNIe como acceso universal en entornos multiplataforma
DNIe como acceso universal en entornos multiplataformaDNIe como acceso universal en entornos multiplataforma
DNIe como acceso universal en entornos multiplataforma
Josep Bardallo
 
S3 internet business with user data
S3   internet business with user dataS3   internet business with user data
S3 internet business with user dataJosep Bardallo
 
Svt cloud security services - Catalogo de Servicios
Svt cloud security services - Catalogo de ServiciosSvt cloud security services - Catalogo de Servicios
Svt cloud security services - Catalogo de Servicios
Josep Bardallo
 
M10 service management
M10 service managementM10 service management
M10 service managementJosep Bardallo
 
M5 internet systems & applications ii
M5 internet systems & applications iiM5 internet systems & applications ii
M5 internet systems & applications iiJosep Bardallo
 
S4 public or private datacenter
S4 public or private datacenterS4 public or private datacenter
S4 public or private datacenterJosep Bardallo
 

Viewers also liked (9)

M9 cloud & open source
M9 cloud & open sourceM9 cloud & open source
M9 cloud & open source
 
DNIe como acceso universal en entornos multiplataforma
DNIe como acceso universal en entornos multiplataformaDNIe como acceso universal en entornos multiplataforma
DNIe como acceso universal en entornos multiplataforma
 
S5 email dying
S5 email dyingS5 email dying
S5 email dying
 
S3 internet business with user data
S3   internet business with user dataS3   internet business with user data
S3 internet business with user data
 
S6 cloud hype cycle
S6 cloud hype cycleS6 cloud hype cycle
S6 cloud hype cycle
 
Svt cloud security services - Catalogo de Servicios
Svt cloud security services - Catalogo de ServiciosSvt cloud security services - Catalogo de Servicios
Svt cloud security services - Catalogo de Servicios
 
M10 service management
M10 service managementM10 service management
M10 service management
 
M5 internet systems & applications ii
M5 internet systems & applications iiM5 internet systems & applications ii
M5 internet systems & applications ii
 
S4 public or private datacenter
S4 public or private datacenterS4 public or private datacenter
S4 public or private datacenter
 

Similar to M8 privacy & regulatory in internet

20161201 witdom bdva summit
20161201 witdom bdva summit20161201 witdom bdva summit
20161201 witdom bdva summit
Elsa Prieto
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
Symantec
 
2017 06-01 1st BIG IoT Webinar
2017 06-01 1st BIG IoT Webinar2017 06-01 1st BIG IoT Webinar
2017 06-01 1st BIG IoT Webinar
BIG IoT Project
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
Cigdem Sengul
 
Privacy and video surveillance: Advanced technology and best practices protec...
Privacy and video surveillance: Advanced technology and best practices protec...Privacy and video surveillance: Advanced technology and best practices protec...
Privacy and video surveillance: Advanced technology and best practices protec...
Salvatore D'Agostino
 
BSI British Standards Information Governance Workshop Presentation
BSI British Standards Information Governance Workshop Presentation BSI British Standards Information Governance Workshop Presentation
BSI British Standards Information Governance Workshop Presentation
BSI British Standards Institution
 
GDPR A Practical Guide with Varonis
GDPR A Practical Guide with VaronisGDPR A Practical Guide with Varonis
GDPR A Practical Guide with Varonis
Angad Dayal
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec
 
2017 06-08 2nd BIG IoT Webinar
2017 06-08 2nd BIG IoT Webinar2017 06-08 2nd BIG IoT Webinar
2017 06-08 2nd BIG IoT Webinar
BIG IoT Project
 
Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019
Ray Bugg
 
20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos
Bart Van Den Brande
 
Pdp4e IPEN-2019
Pdp4e  IPEN-2019Pdp4e  IPEN-2019
Pdp4 e privacy engineering toolkit ipen 2019
Pdp4 e privacy engineering toolkit   ipen 2019Pdp4 e privacy engineering toolkit   ipen 2019
Pdp4 e privacy engineering toolkit ipen 2019
Privacy Data Protection for Engineering
 
DAPSI - Open Call #2 - Webinar #2
DAPSI - Open Call #2 - Webinar #2DAPSI - Open Call #2 - Webinar #2
DAPSI - Open Call #2 - Webinar #2
Data Portability and Services Incubator
 
Legal issues of the Internet of Things
Legal issues of the Internet of ThingsLegal issues of the Internet of Things
Legal issues of the Internet of Things
Giulio Coraggio
 
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Codemotion
 
INFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL securityINFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL security
Samo Zavašnik
 
DWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, Matooma
DWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, MatoomaDWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, Matooma
DWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, Matooma
IDATE DigiWorld
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec
 

Similar to M8 privacy & regulatory in internet (20)

20161201 witdom bdva summit
20161201 witdom bdva summit20161201 witdom bdva summit
20161201 witdom bdva summit
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
2017 06-01 1st BIG IoT Webinar
2017 06-01 1st BIG IoT Webinar2017 06-01 1st BIG IoT Webinar
2017 06-01 1st BIG IoT Webinar
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Privacy and video surveillance: Advanced technology and best practices protec...
Privacy and video surveillance: Advanced technology and best practices protec...Privacy and video surveillance: Advanced technology and best practices protec...
Privacy and video surveillance: Advanced technology and best practices protec...
 
BSI British Standards Information Governance Workshop Presentation
BSI British Standards Information Governance Workshop Presentation BSI British Standards Information Governance Workshop Presentation
BSI British Standards Information Governance Workshop Presentation
 
GDPR A Practical Guide with Varonis
GDPR A Practical Guide with VaronisGDPR A Practical Guide with Varonis
GDPR A Practical Guide with Varonis
 
Highlights FINAL HIGH_RES
Highlights FINAL HIGH_RESHighlights FINAL HIGH_RES
Highlights FINAL HIGH_RES
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
 
2017 06-08 2nd BIG IoT Webinar
2017 06-08 2nd BIG IoT Webinar2017 06-08 2nd BIG IoT Webinar
2017 06-08 2nd BIG IoT Webinar
 
Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019
 
20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos
 
Pdp4e IPEN-2019
Pdp4e  IPEN-2019Pdp4e  IPEN-2019
Pdp4e IPEN-2019
 
Pdp4 e privacy engineering toolkit ipen 2019
Pdp4 e privacy engineering toolkit   ipen 2019Pdp4 e privacy engineering toolkit   ipen 2019
Pdp4 e privacy engineering toolkit ipen 2019
 
DAPSI - Open Call #2 - Webinar #2
DAPSI - Open Call #2 - Webinar #2DAPSI - Open Call #2 - Webinar #2
DAPSI - Open Call #2 - Webinar #2
 
Legal issues of the Internet of Things
Legal issues of the Internet of ThingsLegal issues of the Internet of Things
Legal issues of the Internet of Things
 
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
 
INFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL securityINFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL security
 
DWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, Matooma
DWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, MatoomaDWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, Matooma
DWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, Matooma
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
 

More from Josep Bardallo

M4 internet systems & applications I
M4   internet systems & applications IM4   internet systems & applications I
M4 internet systems & applications IJosep Bardallo
 
M1 network types & internet
M1   network types & internetM1   network types & internet
M1 network types & internetJosep Bardallo
 
S1 internet, secure place for business
S1   internet, secure place for businessS1   internet, secure place for business
S1 internet, secure place for businessJosep Bardallo
 
Securima ti ca 2013 - seguridad en la nube
Securima ti ca 2013 - seguridad en la nubeSecurima ti ca 2013 - seguridad en la nube
Securima ti ca 2013 - seguridad en la nubeJosep Bardallo
 
SVT CloudJacket Service
SVT CloudJacket ServiceSVT CloudJacket Service
SVT CloudJacket ServiceJosep Bardallo
 
SVT. innovacion y crecimiento con Cloud 2013
SVT. innovacion y crecimiento con Cloud 2013SVT. innovacion y crecimiento con Cloud 2013
SVT. innovacion y crecimiento con Cloud 2013Josep Bardallo
 
Ahorro De Costes Con Esso. Best Practices
Ahorro De Costes Con Esso. Best PracticesAhorro De Costes Con Esso. Best Practices
Ahorro De Costes Con Esso. Best Practices
Josep Bardallo
 
SSO ROI
SSO ROISSO ROI
ITIL v3 Problem Management
ITIL v3 Problem ManagementITIL v3 Problem Management
ITIL v3 Problem Management
Josep Bardallo
 
ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)
Josep Bardallo
 

More from Josep Bardallo (11)

M6 cloud computing
M6 cloud computingM6 cloud computing
M6 cloud computing
 
M4 internet systems & applications I
M4   internet systems & applications IM4   internet systems & applications I
M4 internet systems & applications I
 
M1 network types & internet
M1   network types & internetM1   network types & internet
M1 network types & internet
 
S1 internet, secure place for business
S1   internet, secure place for businessS1   internet, secure place for business
S1 internet, secure place for business
 
Securima ti ca 2013 - seguridad en la nube
Securima ti ca 2013 - seguridad en la nubeSecurima ti ca 2013 - seguridad en la nube
Securima ti ca 2013 - seguridad en la nube
 
SVT CloudJacket Service
SVT CloudJacket ServiceSVT CloudJacket Service
SVT CloudJacket Service
 
SVT. innovacion y crecimiento con Cloud 2013
SVT. innovacion y crecimiento con Cloud 2013SVT. innovacion y crecimiento con Cloud 2013
SVT. innovacion y crecimiento con Cloud 2013
 
Ahorro De Costes Con Esso. Best Practices
Ahorro De Costes Con Esso. Best PracticesAhorro De Costes Con Esso. Best Practices
Ahorro De Costes Con Esso. Best Practices
 
SSO ROI
SSO ROISSO ROI
SSO ROI
 
ITIL v3 Problem Management
ITIL v3 Problem ManagementITIL v3 Problem Management
ITIL v3 Problem Management
 
ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)
 

Recently uploaded

dilan 1990 movie riview.pptx untuk mata kuliah
dilan 1990 movie  riview.pptx untuk mata kuliahdilan 1990 movie  riview.pptx untuk mata kuliah
dilan 1990 movie riview.pptx untuk mata kuliah
zarraashivaa
 
MRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANE
MRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANEMRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANE
MRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANE
DK PAGEANT
 
Capsule Wardrobe Women: A document show
Capsule Wardrobe Women:  A document showCapsule Wardrobe Women:  A document show
Capsule Wardrobe Women: A document show
mustaphaadeyemi08
 
Biography and career history of Bruno Amezcua
Biography and career history of Bruno AmezcuaBiography and career history of Bruno Amezcua
Biography and career history of Bruno Amezcua
Bruno Amezcua
 
The Fascinating World of Bats: Unveiling the Secrets of the Night
The Fascinating World of Bats: Unveiling the Secrets of the NightThe Fascinating World of Bats: Unveiling the Secrets of the Night
The Fascinating World of Bats: Unveiling the Secrets of the Night
thomasard1122
 
Care Instructions for Activewear & Swim Suits.pdf
Care Instructions for Activewear & Swim Suits.pdfCare Instructions for Activewear & Swim Suits.pdf
Care Instructions for Activewear & Swim Suits.pdf
sundazesurf80
 
Self-Discipline: The Secret Weapon for Certain Victory
Self-Discipline: The Secret Weapon for Certain VictorySelf-Discipline: The Secret Weapon for Certain Victory
Self-Discipline: The Secret Weapon for Certain Victory
bluetroyvictorVinay
 
thrifthands-thrift store- get the latest trends
thrifthands-thrift store- get the latest trendsthrifthands-thrift store- get the latest trends
thrifthands-thrift store- get the latest trends
amarshifan555
 
Types of Garage Doors Explained: Energy Efficiency, Style, and More
Types of Garage Doors Explained: Energy Efficiency, Style, and MoreTypes of Garage Doors Explained: Energy Efficiency, Style, and More
Types of Garage Doors Explained: Energy Efficiency, Style, and More
Affordable Garage Door Repair
 
Understanding the Mahadasha of Shukra (Venus): Effects and Remedies
Understanding the Mahadasha of Shukra (Venus): Effects and RemediesUnderstanding the Mahadasha of Shukra (Venus): Effects and Remedies
Understanding the Mahadasha of Shukra (Venus): Effects and Remedies
Astro Pathshala
 
Analysis and Assessment of Gateway Process – HemiSync(1).PDF
Analysis and Assessment of Gateway Process – HemiSync(1).PDFAnalysis and Assessment of Gateway Process – HemiSync(1).PDF
Analysis and Assessment of Gateway Process – HemiSync(1).PDF
JoshuaDagama1
 

Recently uploaded (11)

dilan 1990 movie riview.pptx untuk mata kuliah
dilan 1990 movie  riview.pptx untuk mata kuliahdilan 1990 movie  riview.pptx untuk mata kuliah
dilan 1990 movie riview.pptx untuk mata kuliah
 
MRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANE
MRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANEMRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANE
MRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANE
 
Capsule Wardrobe Women: A document show
Capsule Wardrobe Women:  A document showCapsule Wardrobe Women:  A document show
Capsule Wardrobe Women: A document show
 
Biography and career history of Bruno Amezcua
Biography and career history of Bruno AmezcuaBiography and career history of Bruno Amezcua
Biography and career history of Bruno Amezcua
 
The Fascinating World of Bats: Unveiling the Secrets of the Night
The Fascinating World of Bats: Unveiling the Secrets of the NightThe Fascinating World of Bats: Unveiling the Secrets of the Night
The Fascinating World of Bats: Unveiling the Secrets of the Night
 
Care Instructions for Activewear & Swim Suits.pdf
Care Instructions for Activewear & Swim Suits.pdfCare Instructions for Activewear & Swim Suits.pdf
Care Instructions for Activewear & Swim Suits.pdf
 
Self-Discipline: The Secret Weapon for Certain Victory
Self-Discipline: The Secret Weapon for Certain VictorySelf-Discipline: The Secret Weapon for Certain Victory
Self-Discipline: The Secret Weapon for Certain Victory
 
thrifthands-thrift store- get the latest trends
thrifthands-thrift store- get the latest trendsthrifthands-thrift store- get the latest trends
thrifthands-thrift store- get the latest trends
 
Types of Garage Doors Explained: Energy Efficiency, Style, and More
Types of Garage Doors Explained: Energy Efficiency, Style, and MoreTypes of Garage Doors Explained: Energy Efficiency, Style, and More
Types of Garage Doors Explained: Energy Efficiency, Style, and More
 
Understanding the Mahadasha of Shukra (Venus): Effects and Remedies
Understanding the Mahadasha of Shukra (Venus): Effects and RemediesUnderstanding the Mahadasha of Shukra (Venus): Effects and Remedies
Understanding the Mahadasha of Shukra (Venus): Effects and Remedies
 
Analysis and Assessment of Gateway Process – HemiSync(1).PDF
Analysis and Assessment of Gateway Process – HemiSync(1).PDFAnalysis and Assessment of Gateway Process – HemiSync(1).PDF
Analysis and Assessment of Gateway Process – HemiSync(1).PDF
 

M8 privacy & regulatory in internet