This document summarizes a presentation on big data and how organizations can manage access to, privacy of, and security around big data. It defines big data and discusses the four V's of big data - volume, variety, velocity and veracity. It provides examples of how much data organizations and technology companies generate and collect. It also discusses how organizations can analyze big data through techniques like text analytics, social media analytics, and predictive analytics. Finally, it covers privacy and security considerations for big data, such as compliance with regulations, data governance, access management, anonymization, and potential data breaches.
lecture presented by Fe Angela M. Verzosa at the Seminar-workshop on Archives and Records Management for Open Government sponsored by the Commission of Human Rights (CHR) in partnership with the International Council of Museums-Philippines (ICOM-Philippines), De La Salle University-Manila University Library, and the Philippine Association of Museums (PAMI) held on 22 May 2012 at the Commission on Human Rights, UP Diliman, Quezon City
This presentation is about the importance of records management. It also has the different types of records with also a video and a chart showing data.
Electronic Records Management An OverviewKen Matthews
It's estimated that more than 90% of the records being created today are electronic. Coupled with the overwhelming growth of electronic messages - most notably e-mail and instant messaging - the management of electronic records has become a critical business issue. How that information is managed has significant business, legal, and technology ramifications. Ultimately, it doesn't matter what medium is used to create, deliver, or store information when determining if content is a record and should be managed accordingly. Electronic Records Management is not a total solution – it must work in concert with good records management programs, good agency business practices, and reliable information technology infrastructures.
This presentation is intended to provide a foundation to address the challenges of effective Electronic Records Management particularly, but not exclusively in a government context.
lecture presented by Fe Angela M. Verzosa at the Seminar-workshop on Archives and Records Management for Open Government sponsored by the Commission of Human Rights (CHR) in partnership with the International Council of Museums-Philippines (ICOM-Philippines), De La Salle University-Manila University Library, and the Philippine Association of Museums (PAMI) held on 22 May 2012 at the Commission on Human Rights, UP Diliman, Quezon City
This presentation is about the importance of records management. It also has the different types of records with also a video and a chart showing data.
Electronic Records Management An OverviewKen Matthews
It's estimated that more than 90% of the records being created today are electronic. Coupled with the overwhelming growth of electronic messages - most notably e-mail and instant messaging - the management of electronic records has become a critical business issue. How that information is managed has significant business, legal, and technology ramifications. Ultimately, it doesn't matter what medium is used to create, deliver, or store information when determining if content is a record and should be managed accordingly. Electronic Records Management is not a total solution – it must work in concert with good records management programs, good agency business practices, and reliable information technology infrastructures.
This presentation is intended to provide a foundation to address the challenges of effective Electronic Records Management particularly, but not exclusively in a government context.
Understanding records management print and electronicFe Angela Verzosa
lecture presented by Fe Angela M. Verzosa at the Seminar Workshop sponsored by De La Salle University- Dasmarinas, on 4 December 2014 at Luis Aguado Viewing Room, Aklatang Emilio Aguinaldo, DLSU-Dasmarinas, Cavite
Course Outline - Developing Corporate Records Management Systems - Establishi...Lorson Resources Limited
Course outline for 2-day training program entitled: "Developing Corporate Records Management Systems - Establishing and Managing Successful Records Management Programs" presented by Lorson Resources Limited
presented at the three-day Seminar-Workshop on Effective Records Management held at the Carlos Dominguez Conference Hall, Ateneo de Zamboanga University, Zamboanga City, 2009 Mar 24-6
Public and private organizations in all sectors are using their data to give them insight about their companies, as well as a competitive advantage. This session explores some of the key areas that organizations need to be considering in developing a Big Data management strategy: 1) Why are we collecting Big Data? 2) How can we mine our Big Data; 3) What measures are needed to govern Big Data? ; 4) How do we manage sensitive information and ensure compliance with relevant legislation?; and 5) How do we manage the balance the value, risks, and costs of Big Data?
Understanding records management print and electronicFe Angela Verzosa
lecture presented by Fe Angela M. Verzosa at the Seminar Workshop sponsored by De La Salle University- Dasmarinas, on 4 December 2014 at Luis Aguado Viewing Room, Aklatang Emilio Aguinaldo, DLSU-Dasmarinas, Cavite
Course Outline - Developing Corporate Records Management Systems - Establishi...Lorson Resources Limited
Course outline for 2-day training program entitled: "Developing Corporate Records Management Systems - Establishing and Managing Successful Records Management Programs" presented by Lorson Resources Limited
presented at the three-day Seminar-Workshop on Effective Records Management held at the Carlos Dominguez Conference Hall, Ateneo de Zamboanga University, Zamboanga City, 2009 Mar 24-6
Public and private organizations in all sectors are using their data to give them insight about their companies, as well as a competitive advantage. This session explores some of the key areas that organizations need to be considering in developing a Big Data management strategy: 1) Why are we collecting Big Data? 2) How can we mine our Big Data; 3) What measures are needed to govern Big Data? ; 4) How do we manage sensitive information and ensure compliance with relevant legislation?; and 5) How do we manage the balance the value, risks, and costs of Big Data?
IQPC Enterprise IT Security Exchange, March 10, 2013
This presentation looks at the risks and rewards and security and privacy implications of Big Data Analytics.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
3. ARMA NS. Louise Spiteri
Big data is high-volume, high-velocity and
high-variety information assets that demand
cost-effective, innovative forms of information
processing for enhanced insight and decision
making. http://www.gartner.com/it-glossary/big-data/
Big data is a term that describes large volumes
of high velocity, complex, and variable data
that require advanced techniques and
technologies to enable the capture, storage,
distribution, management, and analysis of the
information.
http://www.techamerica.org/Docs/fileManager.cfm?f=techamerica-
bigdatareport-final.pdf
Defining
Big Data
4. ARMA NS. Louise Spiteri
“Insights from Big Data can enable you to
make better decisions. They can help you
facilitate growth and organizational
transformation, reduce costs and manage
volatility and risk. This enables you to
capitalize on new sources of revenue and
generate more value for your organization.”
Financial Accounting Advisory Services (n.d.). Big data strategy to support the CFO and
governance agenda
The
value of
Big Data
6. ARMA NS. Louise Spiteri
How much
data does
your
organization
generate?
7. ARMA NS. Louise Spiteri
Big Data tends to be measured in terms of
terabytes and petabytes (1024 terabytes).
Definitions of “big” are relative, and fluctuate,
especially as storage capacities increase over
time.
Data is generated by every computerized
system in the organization, including human
resources solutions, supply-chain management
software, and social media tools for marketing.
Volume
8. ARMA NS. Louise Spiteri
Google indexes 20 billion pages per day.
Twitter has more than 500 million users and 400
million tweets per day.
Facebook generates 2.7 million
‘Likes’, 500 TB processed, and 300 million photos
that are uploaded per day.
http://bit.ly/1SVxPwp; http://bit.ly/1SVy76j; http://bloom.bg/1SVyldK
Examples
of volume
9. ARMA NS. Louise Spiteri
What types
of data do
you collect
& manage?
10. ARMA NS. Louise Spiteri
Organizations generate various types of structured,
semi-structured, and unstructured data.
Structured data is the tabular type found in
spreadsheets or relational databases (about 10% of
most data).
Text, images, audio, and video are examples of
unstructured data, which sometimes lacks the
structural organization required by machines for
analysis
Variety
11. ARMA NS. Louise Spiteri
How
quickly
does your
data grow
& change?
12. ARMA NS. Louise Spiteri
Velocity refers to the rate at which data is
generated and the speed at which it should be
analyzed and acted upon.
The proliferation of digital devices such as
smartphones has led to an unprecedented rate
of data creation and is driving a growing need
for real-time analytics and evidence-based
planning
Velocity
13. ARMA NS. Louise Spiteri
How
accurate
& reliable
is your
data?
14. ARMA NS. Louise Spiteri
Some data is inherently unreliable; for
example, customer comments in social media,
as they entail judgment.
We need to deal with imprecise and uncertain
data. Is the data that is being stored, and
mined meaningful to the problem being
analyzed?
Veracity
15. ARMA NS. Louise Spiteri
Big Data is often characterized by relatively
“low value density”. That is, the data received
in the original form usually has a low value
relative to its volume. However, a high value
can be obtained by analyzing large volumes of
such data.
Value
16. ARMA NS. Louise Spiteri
Value is any application of big data
that:
• Drives revenue increases (e.g. customer
loyalty analytics)
• Identifies new revenue opportunities,
improves quality and customer satisfaction
(e.g., Predictive Maintenance),
• Saves costs (e.g., fraud analytics)
• Drives better outcomes (e.g., patient care).
Value
18. ARMA NS. Louise Spiteri
Blogs, tweets, social networking sites (such as
LinkedIn and Facebook), blogs, news feeds,
discussion boards, and video sites all fall under
Big Data.
Social
media
19. ARMA NS. Louise Spiteri
Machine-generated data constitutes a wide variety
of devices, from RFIDs to sensors, such as optical,
acoustic, seismic, thermal, chemical, scientific, and
medical devices, and even the weather.
Machine-
generated
data
20. ARMA NS. Louise Spiteri
From the GPS systems in our cars, in planes, and ships, to
GPS apps on smartphones, we use GPS to guide our
movements.
GPS is used to track our movements, such as emergency
beacons, and retailers who use in-store WiFi networks to
access shoppers’ smartphones and track their shopping
habits.
Location Based Services (LBS) allow us to deliver services
based on the location of moving objects such as cars or
people with mobile phones.
GPS
and
spatial
data
22. ARMA NS. Louise Spiteri
It is generally thought that the true value of Big Data is
seen only when it is used to drive decision making.
You need efficient processes to turn high volumes of
fast-moving and varied data into meaningful insights.
As information managers, you might not be doing the
analysis, but you have a crucial role to play in
managing this data to enable this analysis.
Big Data
analytics:
How do
we mine
our data?
23. ARMA NS. Louise Spiteri
Text analytics extract information from textual
data.
• Social network feeds, emails, blogs, online forums, survey
responses, corporate documents, news, and call centre
logs are examples of textual data held by organizations.
Text analytics enable organizations to convert
large volumes of human generated text into
meaningful summaries, which support
evidence-based decision-making.
Text
analytics
24. ARMA NS. Louise Spiteri
Audio analytics analyze and extract information
from unstructured audio data. Customer call
centres and healthcare are the primary
application areas of audio analytics.
• Call centres use audio analytics for efficient analysis
of recorded calls to improve customer experience,
evaluate agent performance, and so forth.
• In healthcare, audio analytics support diagnosis and
treatment of certain medical conditions that affect the
patient’s communication patterns
(e.g.,schizophrenia), or analyze an infant’s cries to
learn about the infant’s health and emotional status.
Audio
analytics
25. ARMA NS. Louise Spiteri
Video analytics involves a variety of techniques to
monitor, analyze, and extract meaningful information
from video streams.
The increasing prevalence of closed-circuit television
(CCTV) cameras and of video-sharing websites are
the two leading contributors to the growth of
computerized video analysis. A key challenge,
however, is the sheer size of video data.
Video
analytics
26. ARMA NS. Louise Spiteri
Social media analytics refer to the analysis of
structured and unstructured data from social
media channels.
• Social networks (e.g., Facebookand LinkedIn)
• Blogs (e.g., Blogger and WordPress)
• Microblogs (e.g.,Twitter and Tumblr)
• Social news (e.g., Digg and Reddit)
• Socia bookmarking (e.g., Delicious and StumbleUpon)
• Media sharing (e.g., Instagram and YouTube)
• Wikis (e.g., Wikipedia and Wikihow)
• Question-and-answer sites (e.g., Yahoo! Answers and Ask.com)
• Review sites (e.g., Yelp, TripAdvisor)
Social
media
analytics
27. ARMA NS. Louise Spiteri
Predictive analytics comprise a variety of
techniques that predict future outcomes based
on historical and current data, e.g., predicting
customers’ travel plans based on what they
buy, when they buy, and even what they say on
social media.
Predictive
analytics
29. ARMA NS. Louise Spiteri
• More data translates = higher risk of exposure in the event of a
breach.
• More experimental usage = the organization's governance and
security protocol is less likely to be in place
• New types of data are uncovering new privacy implications, with
few privacy laws or guidelines to protect that information (e.g.,
cell phone beacons that broadcast physical location, & health
devices such as medical, fitness and lifestyle trackers).
• Data linkage and combined sensitive data. The act of combining
multiple data sources can create unanticipated sensitive data
exposure.
Considerations
for Big Data
30. ARMA NS. Louise Spiteri
“The protection of information and
information systems from unauthorized
access, use, disclosure, disruption,
modification, or destruction in order to
provide confidentiality, integrity, and
availability.” National Institute of Standards and Technology
http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf
Information
security:
Definition
31. ARMA NS. Louise Spiteri
“The claim of individuals, groups
or institutions to determine for
themselves when, how and to
what extent, information about
them is communicated to
others.” International Association of Privacy Professionals
https://iapp.org/resources/privacy-glossary
Data
privacy:
Definition
32. ARMA NS. Louise Spiteri
Under the federal Personal Information Protection and
Electronic Documents Act (PIPEDA), “personal
information” is “information about an identifiable
individual, but does not include the name, title or
business address or telephone number of an
employee of an organization.”
Regulatory
framework
for big
data
33. ARMA NS. Louise Spiteri
The protection of personal information in Canada rests
on three fundamental goals:.
• Transparency – providing people with a basic understanding of how
their personal information will be used in order to gain informed
consent
• Limiting use plus consent – the use of that information only for the
declared purpose for which it was initially collected, or purposes
consistent with that use; and,
• Minimization – limiting the personal information collected to what is
directly relevant and necessary to accomplish the declared purpose
and the discarding of the data once the original purpose has been
served.
PIPEDA
and big
data
34. ARMA NS. Louise Spiteri
Organizations that attempt to implement Big Data
initiatives without a strong governance regime in place,
risk placing themselves in ethical dilemmas without set
processes or guidelines to follow.
A strong ethical code, along with process, training,
people, and metrics, is imperative to govern what
organizations can do within a Big Data program.
Big Data
governance
35. ARMA NS. Louise Spiteri
Data used for Big Data analytics can be gathered
combined from different sources, and create new data
sets.
Organizations must make sure that all security and
privacy requirements that are applied to their original
data sets are tracked and maintained across Big Data
processes throughout the information life cycle, from
data collection to disclosure or retention/destruction.
Respecting
the original
intent of the
information
gathered
36. ARMA NS. Louise Spiteri
Data that has been processed, enhanced, or changed
by Big Data should be anonymized to protect the
privacy of the original data source, such as customers
or vendors.
Data that is not properly anonymized prior to external
release (or in some cases, internal as well) may result
in the compromise of data privacy, as the data is
combined with previously collected, complex data
sets.
Re-
Identification
37. ARMA NS. Louise Spiteri
Matching data sets from third parties may provide
valuable insights that could not be obtained with
your data alone.
You need to consider and evaluate the adequacy of
the security and privacy data protections in place at
the third-party organizations.
Third-
party
use
38. ARMA NS. Louise Spiteri
Big data’s potential for predictive analysis raises
particular concerns for data security and privacy.
• Think of the famous case of Target, which sent
coupons to a teenage girl, based upon her
shopping preferences, which suggested she
was pregnant, as well as her due date (Target
was accurate). The girl’s family found out
about her pregnancy through these coupons.
• Did the girl know that her shopping information
would be used for this purpose?
• Was she informed of Target’s privacy policy?
The risks of
predictive
analytics
39. ARMA NS. Louise Spiteri
There are growing concerns that Big Data is
straining the privacy principles of identifying
purposes and limited use.
Consumers are called upon to agree to privacy
policies and consent forms that no one has the
time to read. The burden is increasingly placed
on the consumers, as these policies take the
form of disclaimers for the orgnizations.
Increasing
burden on
the
consumer
40. ARMA NS. Louise Spiteri
“Just because commercial organizations
can collect personal information and run
it through the revealing algorithms of
predictive analytics, doesn’t mean that
they should.” Jennifer Stoddard
https://www.priv.gc.ca/media/sp-d/2013/sp-d_20131017_e.asp
Can we
vs.
should
we?
41. ARMA NS. Louise Spiteri
A useful tool is the Privacy Maturity Model
designed by the American Institute of Certified
Public Accountants (AICPA) or the Canadian
Institute of Chartered Accountants (CICA).
These sections are particularly relevant:
• 1.2.3: Personal Information Identification and classification
• 1.2.4: Risk Assessment
• 1.2.6: Infrastructure and Systems Management
• 3.2.2: Consent for new Purposes and uses
• 4.2.4: Information developed About Individuals
• 8.2.1: Information security Program.
• http://bit.ly/1SrCcih
Privacy
assessment
42. ARMA NS. Louise Spiteri
Privacy Life cycle (from Maturity Model)
44. ARMA NS. Louise Spiteri
Strong data governance policies
and procedures are important:
• Who owns the data?
• Who is responsible for protecting the
data?
• How is data collected?
• What data is collected?
• How is the data retained?
Handling
&
retaining
data
45. ARMA NS. Louise Spiteri
What security & privacy regulations apply to your
data?
What are the compliance provisions of your
agreements with any third parties or service providers.
What are their privacy and security policies?
Developing a solid compliance framework with a risk-
based map for implementation and maintenance.
Compliance
46. ARMA NS. Louise Spiteri
Develop case scenarios where you would use Big
Data.
Identify what data will be used and how.
Identify possible risks
In this way, you are prepared for when you actually
use the Big Data, rather than be in a position to react
if something goes wrong.
Data
use
cases
47. ARMA NS. Louise Spiteri
Tell your customers what personal data you
collect and how you use it.
Provide consistent consent mechanisms
across all products
Ensure that customers have the means to
withdraw their consent at the individual device
level.
Manage
consent
48. ARMA NS. Louise Spiteri
Have rigorous controls over who has access to
the data.
Have periodic review of who has access rights,
and ensure that rights are removed
immediately, as and when required.
Access
management
49. ARMA NS. Louise Spiteri
Remove all Personally Identifiable
Information (PII) from a data set and turn it into non-
identifying data.
Monitor anonymization requirements and analyze
the risks of re-identification.
Anonymization
50. ARMA NS. Louise Spiteri
Maintain your responsibility to your customers
when you share data with third parties.
Include specific Big Data provisions within
contractual agreements.
Monitor third parties for compliance with data-
sharing agreements.
Data
sharing
55. ARMA NS. Louise Spiteri
Internal Revenue Service (US)
• An unnamed source used an IRS app to download
forms on 200,000 people.
• They were successful in downloading half this
amount and used 15,000 of the forms to claim tax
refunds in other people’s names.
Government
breach, 1
56. ARMA NS. Louise Spiteri
Australian Immigration
Department
• An employee of the department
inadvertently sent passport, visa,
and personal information of all the
world leaders attending the Brisbane
Summit to the organizers of the
Asian Cup football tournament.
Government
breach, 2
58. ARMA NS. Louise Spiteri
Louise.Spiteri@dal.ca
• @Cleese6
• LinkedIn: http://bit.ly/1SrCm9g
• AboutMe: https://about.me/louisespiteri
• ResearchGate: http://bit.ly/1SrCqWB
• School of Information Management: www.dal.ca/sim
Contact
information
59. ARMA NS. Louise Spiteri
http://www.looiconsulting.com/home/enterprise-big-data/
http://www.ibmbigdatahub.com/sites/default/files/infographic
_file/4-Vs-of-big-data.jpg
http://www.kscpa.org/writable/files/AICPADocuments/10-
229_aicpa_cica_privacy_maturity_model_finalebook.pdf
http://blog.templatemonster.com/2013/04/30/thank-you-
pages-optimization/
Image
sources