I presented at the SA Privacy Management Summit on 4 March 2014. I discussed themes relating to responsible data protection practices and focused on why transparency is so important and how it helps companies earn data subjects' trust.
Wearable technologies, privacy and intellectual property rightsGiulio Coraggio
Outline of main legal issues connected to the usage of wearable technologies with particular reference to privacy and data protection, intellectual property rights and confidentiality
Come cambia la cybersecurity con il regolamento privacy europeoGiulio Coraggio
Il regolamento privacy europeo (GDPR) richiede di adottare un nuovo approccio in materia di cyber security a causa del rischio di sanzioni e gli obblighi regolatori applicabili
Wearable technologies, privacy and intellectual property rightsGiulio Coraggio
Outline of main legal issues connected to the usage of wearable technologies with particular reference to privacy and data protection, intellectual property rights and confidentiality
Come cambia la cybersecurity con il regolamento privacy europeoGiulio Coraggio
Il regolamento privacy europeo (GDPR) richiede di adottare un nuovo approccio in materia di cyber security a causa del rischio di sanzioni e gli obblighi regolatori applicabili
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...Giulio Coraggio
Il regolamento privacy europeo comporterà un cambiamento di prospettiva da parte delle aziende. Ma questo cambiamento di prospettiva potrebbe fornire benefici competitivi in quanto i clienti (sia società che consumatori) incominceranno a considerare la conformità alla normativa privacy nelle loro scelte.
Build the Right Secure Your Network Devicesconnectiscyber
According to the Cyber Security Awareness 71% of the cyber attacks target small businesses & almost half of the small enterprises have been attacked. The NCSA has reported three of the major reasons that small businesses often get targeted. They are not available with the resources so as to respond to an attack. The details like the credit card numbers hold less heavily guarded. Small enterprises may get partnered with the larger corporations & provide the hacker's accessibility to those companies. Your network must obtain a firewall so as to protect the network altogether.
When computer networks got isolated within the walls of offices, an Internet connection was countable as a luxury & not as a critical component of the business functions. This has in totality got changed for businesses that rely upon the computers to acquire & deliver services. Customers, business partners, remote office locations, & mobile workers expect the connectivity to your office network. Mobile networks basically expect the interconnected nature of the networks that open doors to new levels of productivity.
Wearable technologies and remote patient remote monitoring systemGiulio Coraggio
This presentation focuses on issues related to wearable technologies in the healthcare sector whose main expression has been given so far by the so called remote patient monitoring systems
Παρουσίαση του κ. Κώστα Γκρίτση στην εκδήλωση που πραγματοποίησε ο Κύκλος Ιδεών για την Εθνική Ανασυγκρότηση σε συνεργασία με το Ίδρυμα Διεθνών Νομικών Μελετών- Καθηγητού Ηλία Κρίσπη και με την υποστήριξη της Ελληνοαμερικανικής Ένωσης, με θέμα:
«Προστασία Προσωπικών Δεδομένων - Ηλεκτρονική Ταυτοποίηση»
Διαχείριση Προσωπικών Δεδομένων μετά την υιοθέτηση του νέου Γενικού Κανονισμού (GDPR) και Ηλεκτρονική Ταυτοποίηση με τη χρήση του δικτύου eIDAS (eID_EU): Επιχειρησιακές, τεχνικές και θεσμικές συνέπειες
την Τετάρτη 14 Μαρτίου 2018, στο Θέατρο της Ελληνοαμερικανικής Ένωσης
Στη συζήτηση συμμετείχαν:
Λίλιαν Μήτρου, Πανεπιστήμιο Αιγαίου - Πολυτεχνική Σχολή
Κωνσταντίνος Χριστοδούλου, Πανεπιστήμιο Αθηνών - Νομική Σχολή
Αντώνης Στασής, Υπουργείο Διοικητικής Ανασυγκρότησης - Διεύθυνση Ηλεκτρονικής Διακυβέρνησης
Χρυσούλα Μιχαηλίδου, ΕΕΤΤ, Νομική Υπηρεσία
Γιώργος Παπασταματίου, FORTH-CRS
Κώστας Γκρίτσης, MICROSOFT
Φερενίκη Παναγοπούλου-Κουτνατζή, Πάντειο Πανεπιστήμιο – Σχολή Δημόσια Διοίκησης
Συντόνισε ο Πέτρος Καβάσαλης, Πανεπιστήμιο Αιγαίου - Πολυτεχνική Σχολή & Κύκλος Ιδεών για την Εθνική Ανασυγκρότηση
https://ekyklos.gr/ev/581-14-3-2018-prostasia-dedomenon-ilektroniki-taftopoiisi.html
How privacy by design can be the key of your success at the time of the digit...Giulio Coraggio
Privacy by design is crucial to adapt the GDPR compliance strategy of copmpanies to new technologies whose evolution will be frenetic at the time of the digitalization.
Cyber Liability Insurance And Protecting SMEsE Radar
Insurance broker Duncan Sutcliffe looks at the growing market of cyber liability insurance and how SMEs can protect their business by implementing security measures to include IASME standards.
What changes for Internet of Things technologies with the EU Data Protection ...Giulio Coraggio
The Internet of Things (IoT) relies on the large processing of personal data. And with the adoption of the EU Data Protection Regulation, companies investing on IoT technologies shall considerably change their approach, also because of the potential sanctions up to 4% of the global turnover of the breaching entity for privacy breaches.
Tripwire University: Cyberwar Boot Camp – Introduction and OverviewTripwire
In this presentation, Gajraj Singh, VP of Product Marketing, defines “cyberwar,” explains the implications of breaches on an organization, and shows how Tripwire addresses cybersecurity challenges.
VISITOR MANAGEMENT SYSTEMS
Walking through the lobby of an office building typically entails greeting the security guard, presenting your identification, and waiting for further instructions on how to access the premises. However, as technology continues to modernize it also changes the way we work and communicate. Computers are quickly replacing the familiar faces of security desk staff and our digital identities are quickly defining our access. https://mikeechols.com/visitor-management-system
Who are you online? John C. Havens and Shel Holtz are working on a book about the nature of Transparency in Business, tentatively titled, "Media 2.Open." This, "Transparency Manifesto" was presented as an interactive workshop at Podcamp Boston 2, on Saturday, October 27, 2007.
Transparency: what it means to your customers and its impact to your businessTransparency Marketing
What you'll learn:
1. Why transparency is important to your sales and marketing.
2. What is transparency.
3. The key benefits of transparency to your company.
4. How you can create transparency in your sales and marketing communications.
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...Giulio Coraggio
Il regolamento privacy europeo comporterà un cambiamento di prospettiva da parte delle aziende. Ma questo cambiamento di prospettiva potrebbe fornire benefici competitivi in quanto i clienti (sia società che consumatori) incominceranno a considerare la conformità alla normativa privacy nelle loro scelte.
Build the Right Secure Your Network Devicesconnectiscyber
According to the Cyber Security Awareness 71% of the cyber attacks target small businesses & almost half of the small enterprises have been attacked. The NCSA has reported three of the major reasons that small businesses often get targeted. They are not available with the resources so as to respond to an attack. The details like the credit card numbers hold less heavily guarded. Small enterprises may get partnered with the larger corporations & provide the hacker's accessibility to those companies. Your network must obtain a firewall so as to protect the network altogether.
When computer networks got isolated within the walls of offices, an Internet connection was countable as a luxury & not as a critical component of the business functions. This has in totality got changed for businesses that rely upon the computers to acquire & deliver services. Customers, business partners, remote office locations, & mobile workers expect the connectivity to your office network. Mobile networks basically expect the interconnected nature of the networks that open doors to new levels of productivity.
Wearable technologies and remote patient remote monitoring systemGiulio Coraggio
This presentation focuses on issues related to wearable technologies in the healthcare sector whose main expression has been given so far by the so called remote patient monitoring systems
Παρουσίαση του κ. Κώστα Γκρίτση στην εκδήλωση που πραγματοποίησε ο Κύκλος Ιδεών για την Εθνική Ανασυγκρότηση σε συνεργασία με το Ίδρυμα Διεθνών Νομικών Μελετών- Καθηγητού Ηλία Κρίσπη και με την υποστήριξη της Ελληνοαμερικανικής Ένωσης, με θέμα:
«Προστασία Προσωπικών Δεδομένων - Ηλεκτρονική Ταυτοποίηση»
Διαχείριση Προσωπικών Δεδομένων μετά την υιοθέτηση του νέου Γενικού Κανονισμού (GDPR) και Ηλεκτρονική Ταυτοποίηση με τη χρήση του δικτύου eIDAS (eID_EU): Επιχειρησιακές, τεχνικές και θεσμικές συνέπειες
την Τετάρτη 14 Μαρτίου 2018, στο Θέατρο της Ελληνοαμερικανικής Ένωσης
Στη συζήτηση συμμετείχαν:
Λίλιαν Μήτρου, Πανεπιστήμιο Αιγαίου - Πολυτεχνική Σχολή
Κωνσταντίνος Χριστοδούλου, Πανεπιστήμιο Αθηνών - Νομική Σχολή
Αντώνης Στασής, Υπουργείο Διοικητικής Ανασυγκρότησης - Διεύθυνση Ηλεκτρονικής Διακυβέρνησης
Χρυσούλα Μιχαηλίδου, ΕΕΤΤ, Νομική Υπηρεσία
Γιώργος Παπασταματίου, FORTH-CRS
Κώστας Γκρίτσης, MICROSOFT
Φερενίκη Παναγοπούλου-Κουτνατζή, Πάντειο Πανεπιστήμιο – Σχολή Δημόσια Διοίκησης
Συντόνισε ο Πέτρος Καβάσαλης, Πανεπιστήμιο Αιγαίου - Πολυτεχνική Σχολή & Κύκλος Ιδεών για την Εθνική Ανασυγκρότηση
https://ekyklos.gr/ev/581-14-3-2018-prostasia-dedomenon-ilektroniki-taftopoiisi.html
How privacy by design can be the key of your success at the time of the digit...Giulio Coraggio
Privacy by design is crucial to adapt the GDPR compliance strategy of copmpanies to new technologies whose evolution will be frenetic at the time of the digitalization.
Cyber Liability Insurance And Protecting SMEsE Radar
Insurance broker Duncan Sutcliffe looks at the growing market of cyber liability insurance and how SMEs can protect their business by implementing security measures to include IASME standards.
What changes for Internet of Things technologies with the EU Data Protection ...Giulio Coraggio
The Internet of Things (IoT) relies on the large processing of personal data. And with the adoption of the EU Data Protection Regulation, companies investing on IoT technologies shall considerably change their approach, also because of the potential sanctions up to 4% of the global turnover of the breaching entity for privacy breaches.
Tripwire University: Cyberwar Boot Camp – Introduction and OverviewTripwire
In this presentation, Gajraj Singh, VP of Product Marketing, defines “cyberwar,” explains the implications of breaches on an organization, and shows how Tripwire addresses cybersecurity challenges.
VISITOR MANAGEMENT SYSTEMS
Walking through the lobby of an office building typically entails greeting the security guard, presenting your identification, and waiting for further instructions on how to access the premises. However, as technology continues to modernize it also changes the way we work and communicate. Computers are quickly replacing the familiar faces of security desk staff and our digital identities are quickly defining our access. https://mikeechols.com/visitor-management-system
Who are you online? John C. Havens and Shel Holtz are working on a book about the nature of Transparency in Business, tentatively titled, "Media 2.Open." This, "Transparency Manifesto" was presented as an interactive workshop at Podcamp Boston 2, on Saturday, October 27, 2007.
Transparency: what it means to your customers and its impact to your businessTransparency Marketing
What you'll learn:
1. Why transparency is important to your sales and marketing.
2. What is transparency.
3. The key benefits of transparency to your company.
4. How you can create transparency in your sales and marketing communications.
How the IT system can match with meeting demands of fast growing needs to business and some essential parameters which could help them in achieving it.
Tricycle SM & Internal Customers PresentationJustin Foster
This presentation is directed towards larger organizations wishing to implement social media as an internal communication tool. This presentation is available as a 60 - 90 minute keynote or a full day workshop.
Social media: Legal and business challengesPaul Jacobson
This is a presentation for the IT Governance Forum which ran between 24 and 27 November 2009. My goal was to highlight concrete risks that social media poses and some of the ways to address those risks.
Business is based on trust. In the cloud, to deserve the trust of its customers and others, a company must be able to demonstrate that it protects the privacy and security of the data in its custody. It must communicate clearly and specifically the nature and extent of the measures taken to protect these data, and show how they meet the existing legal and regulatory requirements, standards, best practices and benchmarks. Customers, on the other end, need tools to evaluate and compare different offerings so that they can decide which one deserves their trust and their business.
Iot report federal trade commission_150127iotrptMarket Engel SAS
I publish this FTC report on IOT because i think that it's a good report and it has also been -- i think -- wrongly been seen as potentially bashing IOT potentials. See, for example, an article published yesterday "From www.theverge.com - February 15, 11:24 PM
'In the internet of things, the Federal Trade Commission sees the possibility of flourishing new markets. But it also sees a prologue to Black Mirror: in a new report that probes the privacy implications of connected devices, the commission surveys a landscape of possible dystopian futures. Get ready for invasive marketing, unending consumer surveillance, invisible nudging, and new potential for government spying and novel forms of hacking...'"
The FTC report is 55 page long, refers to workshops discussions that took place in nov 2013, and although the report stages pros and cons in a very articulated manner, the FTC applies to IOT the security & privacy guidelines and other 'good practices' that have been applied to internet-of-other-things, :-), so far. So, i think that we need to be super cautious about these discussions: Yes, the IOT generates challenges with which we may not yet be familiar with. But not really more. And let's remember that, unless we haven't learned about basic security risks, we are still in a position to say 'no' if the risks look bigger than the opportunities. Many say that 'privacy' -- as we've known it on the net 10 years ago -- is gone. Maybe. Things evolve. But at this stage, i think that no, IOT won't kill privacy. It might actually be the contrary. Let's think that, thx to IOT, i'll be more capable to change the way i work, live, pay and play online and offline. Let's say that, thx to IOT, my assurance level(s) against risks of -- for example -- ID theft and impersonation does rise. Let's believe that, thx to IOT, we just become more and better aware of what matters and does not,, so that we have the tools and the systems to better manage our environment. To make a long story short, let's just recall that IOT technology is just like any other technology: It is neutral. What is not neutral is its use. So, this is why i believe that there is, with IOT, more opportunities than risks to strengthen the privacy of our environment... provided that -- yes, i agree -- we (also) think IOT this way. My 2cts. fred.
FTC Internet of Things Report
The report includes the following recommendations for companies developing Internet of Things devices:
build security into devices at the outset, rather than as an afterthought in the design process;
train employees about the importance of security, and ensure that security is managed at an appropriate level in the organization;
ensure that when outside service providers are hired, that those providers are capable of maintaining reasonable security, and provide reasonable oversight of the providers;
when a security risk is identified, consider a “defense-in-depth” strategy whereby multiple layers of security may be used to defend against a particular risk;
consider measures to keep unauthorized users from accessing a consumer’s device, data, or personal information stored on the network;
monitor connected devices throughout their expected life cycle, and where feasible, provide security patches to cover known risks.
Protecting The Crown Jewels: Trade Secrets and Non-Disclosure Agreements Part IJohn Watkins
These are the slides from Part 1 of our video podcast on Trade Secrets and Non-Disclosure Agreements. The presentation with audio is available at www.ctflegal.blip.tv
How to Manage Vendors and Third Parties to Minimize Privacy RiskTrustArc
The scope of vendor or third-party requirements has significantly grown due to the global pandemic we’re living in. Not only are you working to ensure your vendor management efforts will result in compliance with GDPR, CCPA and other privacy regulations, now you must consider privacy risks associated with COVID-19.
Regulations have specific provisions that address vendors and extend companies’ data privacy obligations throughout their supply chains. Organizations need to be able to collect, maintain and track critical data for ongoing vendor management in order to properly evaluate, monitor and track their status.
This webinar will provide:
-Overview of privacy laws and regulations (i.e., CCPA, GDPR) and corresponding vendor and third-party requirements
-Summary of vendor management processes and how they can be supplemented to specifically address data privacy and security risks
-Best practices for managing data privacy in your vendor network
-Guidance on how to build & manage your vendor privacy management program with practical solutions
With a fine of up to 4% of an organisation’s annual turnover on the line, Individuals accountable and responsible for data protection are actively seeking clarification and advice regarding the impending changes to the EU General Data Protection Regulation.
The question now? How prepared are you to meet the EU General Data Protection Regulation?
IRM’s resident Data Protection expert Paul Sexby, addresses the areas that need to be considered in order to prepare for the new requirements.
From the 2017 Intermountain CFO Summit. How do CFOs manage financial risk. What role does insurance play? This presentation is by a friend of the firm - Diversified Insurance
EU General Data Protection Regulation - Update 2017Cliff Ashcroft
This free Lasa webinar looks at why data protection is important in a digital world, and what practical things charities and civil society organisations can do to prepare for when the EU General Data Protection Regulations come into force in May 2018.
It is vital charities use the next 12 months to understand their new responsibilities and put the required processes in place.
Our webinar gives you the opportunity to ensure you are prepared for what’s to come by putting your #GDPR questions to our data protection expert and published author, Paul Ticher.
Lasa does lots more charity tech help and advice - find out more at: Twitter: @lasaict
Acknowledgements:
Lasa actively promotes and supports the Way Ahead – Civil Society at the Heart of London. See www.citybridgetrust.org.uk/publications/way-ahead/
This webinar is supported by the City of London Corporation's charity, City Bridge Trust. www.citybridgetrust.org.uk
This article examines cyber and information security as it relates to the legal industry and provides strategic considerations for law firms looking to deal with information security issues.
Similar to Why transparency is so important - my presentation at the 2014 SA Privacy Management Summit (20)
2014-09-18 Protection of Personal Information Act readiness workshopPaul Jacobson
I presented at the 3rd Protection of Personal Information Act readiness workshop of 2014 on the topic of practical data protection practices. I focused on high level constraints and useful approaches to policy development and data processing strategies.
2014-04-16 Protection of Personal Information Act Readiness WorkshopPaul Jacobson
These are my slides for my presentation at the Protection of Personal Information Act Readiness Workshop at the OR Tambo Protea Hotel on 16 April 2014. My focus was on understanding data processing constraints; identifying key risk areas and the benefits of better data protection frameworks.
I presented at an event to promote the PaperFreeWeb movement and spoke about paper-less workflows and some of the legal issues to bear in mind when shifting to a digital workflow.
I was invited to present at the 2014 Photo and Film Expo and spoke about copyright and a couple related themes to a terrific audience comprising a number of professional photographers.
2013 05-29 Advertising and Marketing Law PresentationPaul Jacobson
I presented at this terrific conference about social media and the law. I touched on a couple themes including copyright, online reputation and privacy. I took a new approach (for me, at least) and used my diabetes as an analogy for how non-lawyers tend to approach Legal.
2013 03-06 ITWeb GRC presentation on reputation managementPaul Jacobson
These are my slides for my presentation at the ITWeb GRC conference on 6 March 2013 on reputation as a corporate governance issue from the perspective of the social Web.
I am presenting at the POPI Becomes Law briefing and will talk about the social Web and social marketing aspects of the anticipated Protection of Personal Information Act.
Marketing on the social Web - Marketing Legislation ConferencePaul Jacobson
I gave this presentation at the Marketing Legislation Conference in Rosebank on 29 July 2009. It addresses some of the issues marketers should be aware of when marketing on the social Web.
This is an update to my presentation on legal issues arising out of new media. I will present this version at a series of breakfast talks hosted by Quirk.biz
This is a presentation I am giving at the moment (circa April 2008) about new media and the law. It is an expanded version of a presentation I uploaded recently and which I attempted to replace.
Legal Aspects Of New Media 2nd Annual New MediaPaul Jacobson
This is my presentation which I will be giving on 27 March 2008 at the 2nd Annual New Media Marketing Conference at Gallagher Estate, Midrand, South Africa
Digital Transformation and IT Strategy Toolkit and TemplatesAurelien Domont, MBA
This Digital Transformation and IT Strategy Toolkit was created by ex-McKinsey, Deloitte and BCG Management Consultants, after more than 5,000 hours of work. It is considered the world's best & most comprehensive Digital Transformation and IT Strategy Toolkit. It includes all the Frameworks, Best Practices & Templates required to successfully undertake the Digital Transformation of your organization and define a robust IT Strategy.
Editable Toolkit to help you reuse our content: 700 Powerpoint slides | 35 Excel sheets | 84 minutes of Video training
This PowerPoint presentation is only a small preview of our Toolkits. For more details, visit www.domontconsulting.com
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
B2B payments are rapidly changing. Find out the 5 key questions you need to be asking yourself to be sure you are mastering B2B payments today. Learn more at www.BlueSnap.com.
In the Adani-Hindenburg case, what is SEBI investigating.pptxAdani case
Adani SEBI investigation revealed that the latter had sought information from five foreign jurisdictions concerning the holdings of the firm’s foreign portfolio investors (FPIs) in relation to the alleged violations of the MPS Regulations. Nevertheless, the economic interest of the twelve FPIs based in tax haven jurisdictions still needs to be determined. The Adani Group firms classed these FPIs as public shareholders. According to Hindenburg, FPIs were used to get around regulatory standards.
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesHolger Mueller
Holger Mueller of Constellation Research shares his key takeaways from SAP's Sapphire confernece, held in Orlando, June 3rd till 5th 2024, in the Orange Convention Center.
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
LA HUG - Video Testimonials with Chynna Morgan - June 2024Lital Barkan
Have you ever heard that user-generated content or video testimonials can take your brand to the next level? We will explore how you can effectively use video testimonials to leverage and boost your sales, content strategy, and increase your CRM data.🤯
We will dig deeper into:
1. How to capture video testimonials that convert from your audience 🎥
2. How to leverage your testimonials to boost your sales 💲
3. How you can capture more CRM data to understand your audience better through video testimonials. 📊
9. POPI places much emphasis on security
“A responsible party must secure the integrity and confidentiality
of personal information in its possession or under its control by
taking appropriate, reasonable technical and organisational
measures …” - Section 19
“A responsible party must, in terms of a written contract between
the 10 responsible party and the operator, ensure that the
operator which processes personal information for the responsible
party establishes and maintains the security measures referred to
in section 19 …” - Section 21
10. Avoid court if you can
It is a drawn out process and reputational harm is
much more immediate and potentially more severe.