SlideShare a Scribd company logo
1 of 20
PRIVACY TRENDS
Privacy protection in the age of technology
THE SPEAKER:
Desmond Israel
Enterprise Privacy & Security Practitioner
LLB, BSC, CASP, QSC-VM, CCNSP
HIS EXPERIENCE:
3 Years in Data Privacy
10 Years in IT Security
15 Years in IT Business Development
8 Years in Public Speaking [IT Subject-Matter Expert]
BIO
INTRODUCTION
Behold, the digital revolution! It glitters with
possibilities, opportunities and hope.
Consumers have seized the power to dictate what they want,
when
they want it, whom they buy from and how much they want to
pay.
But at what cost?
Organizations, eager to please the voracious appetites of
these super consumers, seize any opportunity available,
often through an
ever-emerging array of new technologies, to
communicate, build
relationships, gather reams of data and sell.The EYs Privacy trends 2013 report (ey.com/privacy2013), identified three
megatrends that were playing increasingly larger roles across the privacy
landscape: governance, technology and regulation.
How can organizations safeguard privacy in an
age of technology? The answer lies more in
governance than regulation, in innovation
more than compliance.
Hint: Privacy By Design
TECHNOLOGY TRENDS
HAVE PRIVACY IMPLICATIONS
CURRENT TECHNOLOGIES
Digital devices and BYOD/BYOC
Solution: Outline clear protocols as guide, partitioning of the devices, Guest
Network & Sandbox
Social Media
Solution: Data collection vigilance & anonymization
Big data and data analytics
Solution: Anonymization, appropriate 3rd party permission & exposure control
Cloud Service Brokerage
Solution: Understand, apply, monitor & maintain organizational privacy policy
ON THE HORIZON
In-Memory Computing
Solution: Flexible and scalable privacy framework for emerging technology
The Internet of Things
Solution: Balance the efficiencies of IoT against consumer privacy
REGULATIONS FALL BEHIND AS
NEW TECHNOLOGIES EMERGE
Today’s privacy regulations, as well as those being considered by regulatory bodies around the
world,
seem completely inadequate to protect individuals from the privacy risks emerging technologies
present.
GHANA: Data Protection Act 2012 (Act 873) currently in force under the Data Protection
Commission
The Data Protection Act, 2012 (Act 843) is premised on the fundamental rule that all
who process personal data must take into consideration the right of that individual to
the privacy of his or her communications. This recognition by a data controller or
processer should lead to the application of the 8 basic principles for processing
personal information. The Act sets out the 8 data principles under Section 17 as
follows:
Accountability
Lawfulness Of Processing
Specification Of Purpose
Compatibility Of Further Processing With Purpose Of Collection
Quality Of Information
Openness
Data Security Safeguards
Data Subject Participation
APPLYING DATA PROTECTION PRINCIPLES
1. ACCOUNTABILITY
Processing of Personal Data (Section 18)
2. LAWFULNESS OF PROCESSING
Minimality (Section19)
Consent, justification and objection (20)
Collection of personal data (Section 21)
Retention of records (Section 24)
Data processed by data processor or an authorised person (Section 29)
3. SPECIFICATION OF PURPOSE
Collection of data for specific purpose (Section 22)
Data subject to be made aware of purpose of collection (Section 23)
4. COMPATIBILITY OF FURTHER PROCESSING WITH PURPOSE OF
COLLECTION
Further processing to be compatible with purpose of collection (Section 25)
APPLYING DATA PROTECTION PRINCIPLES
5. QUALITY OF INFORMATION (Section 26)
6. OPENNESS
Registration of data controller (Section 27)
7. DATA SECURITY SAFEGUARDS
Security measures (Section 28)
Data processor to comply with security measures (Section 30)
Notification of security compromises (Section 31)
8. DATA SUBJECT PARTICIPATION
Access to personal information (Section 32)
Correction of personal data (Section 33)
APPLYING DATA PROTECTION PRINCIPLES
Governments are making valiant efforts to protect privacy, but they cannot do it alone.
Accountability for
privacy and personal data protection needs to be a joint effort among governments, privacy
commissioners,
organizations and individuals themselves.
Without such a coordinated effort, the whole notion of Right to Privacy may disappear.
IDEAL APPROACH
REFERENCES:
EY Insights on governance, risk and compliance
Privacy trends 2014 Privacy protection in the age of technology, January
2014
Data Protection Act 2012, Act 873 of Ghana
GET IN TOUCH:
desmond.israel@gmail.com
@desmond_israel

More Related Content

What's hot

GDPR Data Life Cycle
GDPR Data Life CycleGDPR Data Life Cycle
GDPR Data Life CycleJatin Kochhar
 
A practical approach to the internet of things by Kristian Foss
A practical approach to the internet of things by Kristian FossA practical approach to the internet of things by Kristian Foss
A practical approach to the internet of things by Kristian FossKristian Foss
 
Why We Require GDPR?
Why We Require GDPR?Why We Require GDPR?
Why We Require GDPR?Jatin Kochhar
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE-Journal ICT4D
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001Owako Rodah
 
Payslip gdpr deck nov 2017
Payslip gdpr deck nov 2017Payslip gdpr deck nov 2017
Payslip gdpr deck nov 2017Aoife Flynn
 
GDPR all concerned! Essential Issues of the General Data Protection Regulatio...
GDPR all concerned! Essential Issues of the General Data Protection Regulatio...GDPR all concerned! Essential Issues of the General Data Protection Regulatio...
GDPR all concerned! Essential Issues of the General Data Protection Regulatio...EnjoyDigitAll by BNP Paribas
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for developmentTomppa Järvinen
 
3 minute reading time on how you can comply with GDPR.
3 minute reading time on how you can comply with GDPR.3 minute reading time on how you can comply with GDPR.
3 minute reading time on how you can comply with GDPR.Richard Kranendonk
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Jan Carroza
 
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...eHealth Forum
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 
GDPR From Implementation to Opportunity
GDPR From Implementation to OpportunityGDPR From Implementation to Opportunity
GDPR From Implementation to OpportunityDean Sappey
 

What's hot (20)

GDPR Data Life Cycle
GDPR Data Life CycleGDPR Data Life Cycle
GDPR Data Life Cycle
 
GDPR Data Lifecycle
GDPR Data LifecycleGDPR Data Lifecycle
GDPR Data Lifecycle
 
A practical approach to the internet of things by Kristian Foss
A practical approach to the internet of things by Kristian FossA practical approach to the internet of things by Kristian Foss
A practical approach to the internet of things by Kristian Foss
 
Why We Require GDPR?
Why We Require GDPR?Why We Require GDPR?
Why We Require GDPR?
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalf
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
 
Payslip gdpr deck nov 2017
Payslip gdpr deck nov 2017Payslip gdpr deck nov 2017
Payslip gdpr deck nov 2017
 
GDPR all concerned! Essential Issues of the General Data Protection Regulatio...
GDPR all concerned! Essential Issues of the General Data Protection Regulatio...GDPR all concerned! Essential Issues of the General Data Protection Regulatio...
GDPR all concerned! Essential Issues of the General Data Protection Regulatio...
 
GDPR practical info session for development
GDPR practical info session for developmentGDPR practical info session for development
GDPR practical info session for development
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
3 minute reading time on how you can comply with GDPR.
3 minute reading time on how you can comply with GDPR.3 minute reading time on how you can comply with GDPR.
3 minute reading time on how you can comply with GDPR.
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...
 
Preparing for EU GDPR
Preparing for EU GDPRPreparing for EU GDPR
Preparing for EU GDPR
 
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
 
What does GDPR mean for your charity?
What does GDPR mean for your charity?What does GDPR mean for your charity?
What does GDPR mean for your charity?
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
GDPR From Implementation to Opportunity
GDPR From Implementation to OpportunityGDPR From Implementation to Opportunity
GDPR From Implementation to Opportunity
 
Privacy and Data: Master Class
Privacy and Data: Master ClassPrivacy and Data: Master Class
Privacy and Data: Master Class
 

Viewers also liked

Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Mike Barker
 
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
RESEARCH  - STUDIES IN CONSTITUTIONAL LAWRESEARCH  - STUDIES IN CONSTITUTIONAL LAW
RESEARCH - STUDIES IN CONSTITUTIONAL LAWChirine Haddad ?
 
My Lawyer Made Me Do It Daniel Green Affilicon Israel June 2009
My Lawyer Made Me Do It   Daniel Green   Affilicon Israel   June 2009My Lawyer Made Me Do It   Daniel Green   Affilicon Israel   June 2009
My Lawyer Made Me Do It Daniel Green Affilicon Israel June 2009affilicon
 
The Expanding Horizon of Article21 (Indian Constitution)
The Expanding Horizon of Article21 (Indian Constitution)The Expanding Horizon of Article21 (Indian Constitution)
The Expanding Horizon of Article21 (Indian Constitution)Faisal Mahmood
 
Mobile Privacy in the Digital Age
Mobile Privacy in the Digital AgeMobile Privacy in the Digital Age
Mobile Privacy in the Digital Agehelena_wade
 
Privacy In The Digital Age
Privacy In The Digital AgePrivacy In The Digital Age
Privacy In The Digital AgeJane Prusakova
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacych samaram
 
Power-user l Productivity add-in for PowerPoint and Excel
Power-user l Productivity add-in for PowerPoint and ExcelPower-user l Productivity add-in for PowerPoint and Excel
Power-user l Productivity add-in for PowerPoint and ExcelPower-user
 

Viewers also liked (9)

Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.
 
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
RESEARCH  - STUDIES IN CONSTITUTIONAL LAWRESEARCH  - STUDIES IN CONSTITUTIONAL LAW
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
 
My Lawyer Made Me Do It Daniel Green Affilicon Israel June 2009
My Lawyer Made Me Do It   Daniel Green   Affilicon Israel   June 2009My Lawyer Made Me Do It   Daniel Green   Affilicon Israel   June 2009
My Lawyer Made Me Do It Daniel Green Affilicon Israel June 2009
 
The Expanding Horizon of Article21 (Indian Constitution)
The Expanding Horizon of Article21 (Indian Constitution)The Expanding Horizon of Article21 (Indian Constitution)
The Expanding Horizon of Article21 (Indian Constitution)
 
Mobile Privacy in the Digital Age
Mobile Privacy in the Digital AgeMobile Privacy in the Digital Age
Mobile Privacy in the Digital Age
 
Privacy In The Digital Age
Privacy In The Digital AgePrivacy In The Digital Age
Privacy In The Digital Age
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacy
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
 
Power-user l Productivity add-in for PowerPoint and Excel
Power-user l Productivity add-in for PowerPoint and ExcelPower-user l Productivity add-in for PowerPoint and Excel
Power-user l Productivity add-in for PowerPoint and Excel
 

Similar to Privacy_Trends

Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...Codemotion
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfyashapnt
 
Data Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdfData Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdfKarpagam Institute
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To ConsiderSymantec
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR ComplianceGabor Farkas
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.CSCJournals
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaProductNation/iSPIRT
 
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxRunning Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxtodd581
 
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxRunning Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxglendar3
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarEryk Budi Pratama
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
Www.ico.org.uk ~ media_documents_library_data_protection_practical_applicatio...
Www.ico.org.uk ~ media_documents_library_data_protection_practical_applicatio...Www.ico.org.uk ~ media_documents_library_data_protection_practical_applicatio...
Www.ico.org.uk ~ media_documents_library_data_protection_practical_applicatio...Victor Gridnev
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsUlf Mattsson
 

Similar to Privacy_Trends (20)

Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
Pronti per la legge sulla data protection GDPR? No Panic! - Domenico Maracci,...
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
 
Data Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdfData Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdf
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Data protection act
Data protection act Data protection act
Data protection act
 
Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.Multi-Dimensional Privacy Protection for Digital Collaborations.
Multi-Dimensional Privacy Protection for Digital Collaborations.
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for India
 
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxRunning Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
 
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docxRunning Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
Running Head PRIVACY AND CYBERSECURITY1PRIVACY AND CYBERSECU.docx
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Www.ico.org.uk ~ media_documents_library_data_protection_practical_applicatio...
Www.ico.org.uk ~ media_documents_library_data_protection_practical_applicatio...Www.ico.org.uk ~ media_documents_library_data_protection_practical_applicatio...
Www.ico.org.uk ~ media_documents_library_data_protection_practical_applicatio...
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 

Privacy_Trends

  • 1. PRIVACY TRENDS Privacy protection in the age of technology
  • 2. THE SPEAKER: Desmond Israel Enterprise Privacy & Security Practitioner LLB, BSC, CASP, QSC-VM, CCNSP HIS EXPERIENCE: 3 Years in Data Privacy 10 Years in IT Security 15 Years in IT Business Development 8 Years in Public Speaking [IT Subject-Matter Expert] BIO
  • 4. Behold, the digital revolution! It glitters with possibilities, opportunities and hope. Consumers have seized the power to dictate what they want, when they want it, whom they buy from and how much they want to pay. But at what cost?
  • 5. Organizations, eager to please the voracious appetites of these super consumers, seize any opportunity available, often through an ever-emerging array of new technologies, to communicate, build relationships, gather reams of data and sell.The EYs Privacy trends 2013 report (ey.com/privacy2013), identified three megatrends that were playing increasingly larger roles across the privacy landscape: governance, technology and regulation.
  • 6. How can organizations safeguard privacy in an age of technology? The answer lies more in governance than regulation, in innovation more than compliance. Hint: Privacy By Design
  • 8.
  • 9.
  • 10. CURRENT TECHNOLOGIES Digital devices and BYOD/BYOC Solution: Outline clear protocols as guide, partitioning of the devices, Guest Network & Sandbox Social Media Solution: Data collection vigilance & anonymization Big data and data analytics Solution: Anonymization, appropriate 3rd party permission & exposure control Cloud Service Brokerage Solution: Understand, apply, monitor & maintain organizational privacy policy
  • 11. ON THE HORIZON In-Memory Computing Solution: Flexible and scalable privacy framework for emerging technology The Internet of Things Solution: Balance the efficiencies of IoT against consumer privacy
  • 12. REGULATIONS FALL BEHIND AS NEW TECHNOLOGIES EMERGE
  • 13. Today’s privacy regulations, as well as those being considered by regulatory bodies around the world, seem completely inadequate to protect individuals from the privacy risks emerging technologies present. GHANA: Data Protection Act 2012 (Act 873) currently in force under the Data Protection Commission
  • 14. The Data Protection Act, 2012 (Act 843) is premised on the fundamental rule that all who process personal data must take into consideration the right of that individual to the privacy of his or her communications. This recognition by a data controller or processer should lead to the application of the 8 basic principles for processing personal information. The Act sets out the 8 data principles under Section 17 as follows: Accountability Lawfulness Of Processing Specification Of Purpose Compatibility Of Further Processing With Purpose Of Collection Quality Of Information Openness Data Security Safeguards Data Subject Participation APPLYING DATA PROTECTION PRINCIPLES
  • 15. 1. ACCOUNTABILITY Processing of Personal Data (Section 18) 2. LAWFULNESS OF PROCESSING Minimality (Section19) Consent, justification and objection (20) Collection of personal data (Section 21) Retention of records (Section 24) Data processed by data processor or an authorised person (Section 29) 3. SPECIFICATION OF PURPOSE Collection of data for specific purpose (Section 22) Data subject to be made aware of purpose of collection (Section 23) 4. COMPATIBILITY OF FURTHER PROCESSING WITH PURPOSE OF COLLECTION Further processing to be compatible with purpose of collection (Section 25) APPLYING DATA PROTECTION PRINCIPLES
  • 16. 5. QUALITY OF INFORMATION (Section 26) 6. OPENNESS Registration of data controller (Section 27) 7. DATA SECURITY SAFEGUARDS Security measures (Section 28) Data processor to comply with security measures (Section 30) Notification of security compromises (Section 31) 8. DATA SUBJECT PARTICIPATION Access to personal information (Section 32) Correction of personal data (Section 33) APPLYING DATA PROTECTION PRINCIPLES
  • 17. Governments are making valiant efforts to protect privacy, but they cannot do it alone. Accountability for privacy and personal data protection needs to be a joint effort among governments, privacy commissioners, organizations and individuals themselves. Without such a coordinated effort, the whole notion of Right to Privacy may disappear. IDEAL APPROACH
  • 18.
  • 19.
  • 20. REFERENCES: EY Insights on governance, risk and compliance Privacy trends 2014 Privacy protection in the age of technology, January 2014 Data Protection Act 2012, Act 873 of Ghana GET IN TOUCH: desmond.israel@gmail.com @desmond_israel