SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
Underwritten by: Presented by:
#AIIMInformationIs Your MostImportant Asset.
Learn the Skills to Manage It.
Data Privacy:
Learn What It Takes to
Protect Your Information
Presented July 26, 2017
Data Privacy – Learn What It Takes
to Protect Your Information
An AIIM Webinarpresented
July 26, 2017
Underwritten by: Presented by:
Greg Reid
CEO
InFuture LLC
Rich Lauwers
InfoGovSME
HewlettPackard
Enterprise
Host: Theresa Resek, CIP
Director
AIIM
Today’s Speakers
Underwritten by: Presented by:
Data Privacy = InfoSec + InfoGov + ‘The Law’
Access &understand Leverage &take action
Unstructured enterprise
datarepositories
Structured enterprise
datarepositories
Cloud-based
repositories
Otherkeyrepositories
Offsiteorremovable
datarepositories
Addressbusiness&
operational objectives
Cross-silo analytics
Enterprise search
Content management
Legal holdsRegulatory compliance
Records managementeDiscovery
Addresslegal&
compliance objectives
Server data protection
Endpoint information management
Addressdataprotection
objectives
Commonpolicies
Organize &control
Virtual machine backup
Long-term retention
Employee productivity
ManageRiskDeriveValue
Serve the organization'scompleteinformation management & governance needs
Informationinsights
Underwritten by: Presented by:
Underwritten by: Presented by:
Policy-Based Privacy Framework
5
Statutes
Regulations
Application Level
Operations Level
Enterprise Policy Engine
Security and
Control
Retention Disposition
Classification&
Management
Policies
Hold and
Discovery
Identification &
Analysis
Monitoring
and
Reporting
Records
Policy
Business
Policy
IT
Policy
Underwritten by: Presented by:
Privacy Makes Information Governance a
Regulatory Issue
Federal Trade Commission
 The FTC has made “reasonable datasecurity and informationgovernance” a
legal requirement. The FTC’sdocumented obligationsfor companies include:
1. Take Stock (Inventory your PI and know where it is located)
2. Scale Down (Minimize the data that you store to is business purpose)
3. Lock It (Self-explanatory: Physical, Electronic, Processes, Administrative,
Education)
4. Pitch It (A good case for a solid Electronic Records Management implementation)
5. Plan Ahead (for the eventual data breach in the organization)
 The FTC does “bite hard”: Unfair or deceptive trade practices related to data
security
Underwritten by: Presented by:
GDPR Enacted to Help Protect EU Citizen Data from Risk
Underwritten by: Presented by:
Privacy Makes Information Governance a
Regulatory Issue
European Union
 The General Data ProtectionRegulation (GDPR) specifically
outlines data security and Info Gov. obligations within its legal framework:
1. Data protections must be built into the system
“By Design and by Default.” (Recital 78 and Article 25)
2. Data must be secured using technical means
(Recital 49 and Articles 5-1(f), 32-1(b-d))
3. A determination must be made almost immediately as to whether a data breach is likely
to have a “high risk to the rights and freedoms of the natural person,” as such a
technical environment must be in place to identify, track and assess such breaches.
(Recitals 85, 87 and numerous GDPR Articles).You have 72 hours to alert data subjects.
4. Numerous other Recitals and Articles have Info Gov. expectations and demands
 Infringement fines can range up to €20,000,000 or 4% of the global revenue of the
organization,whichever is higher, PER breach incident or data processing mistake.
Underwritten by: Presented by:
Privacy Makes Information Governance a
Regulatory Issue
 One of the greatest challenges in Privacy to legallysupport are the greatly
divergent laws, regulations, and expectations:
 Industries: e.g., Healthcare(HIPAA /HITECH), Financial(Gramm-Leach-Bliley Act)
 US States: e.g., Massachusetts (201 CMR17.00), California (numerous…)
 US Regulatory Bodies: e.g., FederalTradeCommission, FederalCommunications Commission,
DHHS Officeof Civil Rights, etc.
 Other Countries andRegions: e.g., EUDirectiveand GDPR, Canadian PIPEDA, China’s CPL
Each statute andregulationcanindividually impact:
 The definition of “personaldata.” And there can be morethan one type of personaldata...
 How personaldata (of various types…) mustbe secured, stored, located, managed, accessed,
controlled, and processed physically and electronically.
 And…the legally required breach preparations, breach responsesand timings.
 The key is understandingwhat laws the companyis accountable to follow.
Underwritten by: Presented by:
Privacy Makes Information Governance a
Regulatory Issue
However, there are key security and technical commonalities across many of the
privacy laws and regulations that can be leveraged and reused:
 Most privacy laws demand administrativePIdata controls (e.g., polices,procedures,notices)
 System designs and builds that integrate privacyand info gov as an early part of the SDLC
 AnonymizingorPseudonymizingdata structures/columns
 Data minimization/retentionpolicies and automated data deletion/disposal(ERM)
processes.Again,back to informationgovernance…
 Accurate inventories ofpersonal datatypes,theirlocations/technologies,and their owners
 Technical environmentssecured using“reasonable,”“practicable,”“industry-standard,”
“state-of-the-art,”“readilyavailable”technologies and procedures(e.g., two-factor
authentication foradministrators)
 Breach prevention,preparation,notification,and response technologies and processes
implemented
 Data access minimizationand limitations,segmentingserverenvironments,etc.
Underwritten by: Presented by:
How Do We Better ConnectLegal Regulationsand
Operational Requirementsto Our Content?
The first and last mile of retention
The First Mile:
Retention Considerations
The Last Mile:
Policy Execution
Government regulations
Industry specific
regulations
IT Operations
Business Needs
Email
Cloud
Desktop
Physical
Content
SAP
Structured
Repositories
Unstructured
repositories
File Shares
Auto collection
of laws
Translate to
retention rules
Centralized
policy
Apply at scale
Audit logs
Connect
Underwritten by: Presented by:
Personal Data is Insidious!
(Definition: Gradual, Subtle, Treacherous…)
 PI and Sensitive PI seems to exist just about everywhere… It creeps:
1. Typical RDBMS transactionalenvironments (ERP, HR, G/L, etc.)
2. User Laptops (in all types of locations such as email clients, HD folders, Evernote, screenshots, etc.)
3. User Mobile Devices (BYOD and company provided)
4. Shared Drive/Folder Servers
5. External Shared Drives (Box, Dropbox, Box, Egnyte, Googledocs, etc.)
6. Email Systems (InternalExchange, Gmail, Yahoo)
7. Content and “Sharing” services (SharePoint, Office365, Livelink, Documentum, Skype, Jive, Slack)
8. Paper notebooks
9. PLUS all of your third-party information partners and outsourcers
(e.g., HIPAA “business associates” and GDPR “data processors”)
 Privacy laws still cover all these physical and electronic locations, with very few exceptions
 These locations need to be technically, procedurally, and administratively secured
Underwritten by: Presented by:
Be Mindful of What You Collect, Store, and Process
 Data minimiz(s)ation
 You can’t lose or have stolen what doesn’t exist
 Multiplejurisdictions– U.S., EU, and more – emphasize this point
 AIIM’s materialson Records and Information Managementare a great place
to help jumpstart your data minimisationand datainventoryefforts
 Watch your vendors, too
 If you’re sharing data,you’re can be responsible if they lose it or misuse it
 Are you auditingthem on a regular basis?
 How are those agreements…?
Underwritten by: Presented by:
Watch What You Collect
 Log files and authentication
 When you create an account, you create PII
 Dataretention: How long do you need to keep that log file?
 Physical security issues
 Single credentials and
employee monitoring
 Theft prevention and customer monitoring
Underwritten by: Presented by:
System Privacy by Design, Privacy by Default
The Discussion of Privacy’s
and Info Gov’s Impact on
Development Begins Here
Source: Wikipedia
Not Here…!
Underwritten by: Presented by:
The Intersectionof the SDLC,Information
Governance,and Privacy
 You design for security and governance; take one step further for privacy
by working with the Developers on their efforts:
 Impacting the Software Development Lifecycle (SDLC) early directly supports your
ability to make your technical environment secure and privacy compliant.
 Your developers’ data architecture designs and data transport layer designs may
directly impact your ability to secure them. Examples: Table layouts and designs vis-à-
vis encryption capabilities for PI-containing columns within the RDBMS.
 Irrespective of the SDLC that your company uses (e.g., Agile©), privacy is a key part of
the upfront planning and design phases as much as security and usability.
Underwritten by: Presented by:
HPE Policy Based Secure ContentManagement
offering
Policy Based Secure Content Management
File &contentanalysis
ID
sensitive
data
PII, PCI,
PHI
ROT
Analysis
Enterprise
policy
application
Manage-
in-place
Classification
Security&
access
Redaction Retention Disposition
Data extraction& applicationretirement
Access Reporting
ID
sensitive
data PII,
PCI, PHI
Redaction
Data
masking
Encryption
Decryption
Underwritten by: Presented by:
Complete Content Platform “Privacy by Design”
Analyse
Record
Repository
Classify
Data Repositories
Messaging
EmailFiles Read
SharePoint
Action
Applications
Data
Warehouses
Document
Management
Data ArchiveSocial
Media
Web
Content
Apply
Store
Eligible Records
Declare
Data
Encryption
Find Govern
Apply Retention
Rules
Compliance, Legal
Hold & Audit
Underwritten by: Presented by:
Summary Points
 The Info Governancecapability is critical to privacy efforts. Withoutit, privacy operations would be
impossibleto conduct.
 Coordination and clarity between the CIO, theGC, Privacy, and the Info Gov. groups arerequired to meet
privacy obligations. No Person is an island where privacy isconcerned.
 Nolaws or regulations require“Superhuman” or “Extraordinary” information governanceor security
efforts. Thewords “Practical,” ”Reasonable,” “Industry-standard” arecommonly used. “Proactive” and “By
Design” are common themes, however.
 Many of the laws and regulations have similar, if not the same, technical, proceduraland administrative
security requirements. Leverage them.
 There are significantidiosyncrasies, even between U.S. States let alone across countries and industries.
Know what is applicable toyour organization. Ask your GeneralCounsel!(and they may not know…).
 PI can be in any number of differentrepositories. You’reresponsiblefor securing all of them according to
regulatory and legal jurisdictions; not justthe obvious data elements inside of the RDBMS.
 If there is incremental $ to spend on privacy and security, you may consider spending it on training and
communications for the employees.
Underwritten by: Presented by:
Greg Reid, CEO
CIP, CIPP/US,CIPP/EU, CIPM,ACEDS/eDiscovery
Master of Jurisprudence: Information Security and Privacy
InFutureLLC
Gregory.Reid@InFutureLLC.com
https://www.linkedin.com/in/gregoryreid/
Rich Lauwers, Information Governance SME
Hewlett Packard Enterprise
Rich.Lauwers@hpe.com
+1 847.232.3566CST, Chicago
Thank You!
Underwritten by: Presented by:
Take a look at what HPE has to offer www.hpe.com/software/scm
HPE GDPR Solutions https://www.hpe.com/us/en/campaigns/gdpr-compliance.html
Underwritten by: Presented by:
#AIIMInformationIs Your MostImportant Asset.
Learn the Skills to Manage It.Information is your most important asset.
Learn the skills to manage it.

Mais conteúdo relacionado

Mais procurados

Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Dr. Ahmed Al Zaidy
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Dr. Ahmed Al Zaidy
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...Symantec
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public versionIBM Sverige
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityHackerOne
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...NetIQ
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesCompTIA
 
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Dr. Ahmed Al Zaidy
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 DaysResilient Systems
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänsterTranscendent Group
 

Mais procurados (20)

Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
 
A Guide to Disaster Preparedness for Businesses
A Guide to Disaster Preparedness for BusinessesA Guide to Disaster Preparedness for Businesses
A Guide to Disaster Preparedness for Businesses
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
 
July 2010 Cover Story
July 2010 Cover StoryJuly 2010 Cover Story
July 2010 Cover Story
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6Fundamentals of Information Systems Security Chapter 6
Fundamentals of Information Systems Security Chapter 6
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 

Semelhante a Data Privacy - Learn What It Takes to Protect Your Information

Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
Michael Josephs
Michael JosephsMichael Josephs
Michael JosephsdaveGBE
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2Flaskdata.io
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docxlorainedeserre
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docxjesusamckone
 
Big data security
Big data securityBig data security
Big data securityAnne ndolo
 
Big data security
Big data securityBig data security
Big data securityAnne ndolo
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
Brian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records ManagementBrian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records Managementbdirking
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...David Kearney
 
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudIntroduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudeDiscoveryConsultant
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentBill Lisse
 
1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdfChunLei(peter) Che
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxstilliegeorgiana
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository XeniT Solutions nv
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datosSoftware Guru
 

Semelhante a Data Privacy - Learn What It Takes to Protect Your Information (20)

Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
 
Big data security
Big data securityBig data security
Big data security
 
Big data security
Big data securityBig data security
Big data security
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Brian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records ManagementBrian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records Management
 
Ai in compliance
Ai in compliance Ai in compliance
Ai in compliance
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudIntroduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the Cloud
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy Development
 
1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
 

Mais de AIIM International

Create, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueCreate, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueAIIM International
 
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...AIIM International
 
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...AIIM International
 
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...AIIM International
 
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...AIIM International
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
 
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...AIIM International
 
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...AIIM International
 
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...AIIM International
 
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence ChannelsAIIM International
 
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...AIIM International
 
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...AIIM International
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part TwoAIIM International
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...AIIM International
 
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...AIIM International
 
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...AIIM International
 
[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern SolutionsAIIM International
 
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...AIIM International
 
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...AIIM International
 

Mais de AIIM International (20)

2022 IIM Infographic.pptx
2022 IIM Infographic.pptx2022 IIM Infographic.pptx
2022 IIM Infographic.pptx
 
Create, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueCreate, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational Value
 
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
 
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
 
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
 
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
 
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
 
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
 
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
 
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
 
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
 
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
 
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
 
[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions
 
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
 
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
 

Último

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Último (20)

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Data Privacy - Learn What It Takes to Protect Your Information

  • 1. Underwritten by: Presented by: #AIIMInformationIs Your MostImportant Asset. Learn the Skills to Manage It. Data Privacy: Learn What It Takes to Protect Your Information Presented July 26, 2017 Data Privacy – Learn What It Takes to Protect Your Information An AIIM Webinarpresented July 26, 2017
  • 2. Underwritten by: Presented by: Greg Reid CEO InFuture LLC Rich Lauwers InfoGovSME HewlettPackard Enterprise Host: Theresa Resek, CIP Director AIIM Today’s Speakers
  • 3. Underwritten by: Presented by: Data Privacy = InfoSec + InfoGov + ‘The Law’ Access &understand Leverage &take action Unstructured enterprise datarepositories Structured enterprise datarepositories Cloud-based repositories Otherkeyrepositories Offsiteorremovable datarepositories Addressbusiness& operational objectives Cross-silo analytics Enterprise search Content management Legal holdsRegulatory compliance Records managementeDiscovery Addresslegal& compliance objectives Server data protection Endpoint information management Addressdataprotection objectives Commonpolicies Organize &control Virtual machine backup Long-term retention Employee productivity ManageRiskDeriveValue Serve the organization'scompleteinformation management & governance needs Informationinsights
  • 5. Underwritten by: Presented by: Policy-Based Privacy Framework 5 Statutes Regulations Application Level Operations Level Enterprise Policy Engine Security and Control Retention Disposition Classification& Management Policies Hold and Discovery Identification & Analysis Monitoring and Reporting Records Policy Business Policy IT Policy
  • 6. Underwritten by: Presented by: Privacy Makes Information Governance a Regulatory Issue Federal Trade Commission  The FTC has made “reasonable datasecurity and informationgovernance” a legal requirement. The FTC’sdocumented obligationsfor companies include: 1. Take Stock (Inventory your PI and know where it is located) 2. Scale Down (Minimize the data that you store to is business purpose) 3. Lock It (Self-explanatory: Physical, Electronic, Processes, Administrative, Education) 4. Pitch It (A good case for a solid Electronic Records Management implementation) 5. Plan Ahead (for the eventual data breach in the organization)  The FTC does “bite hard”: Unfair or deceptive trade practices related to data security
  • 7. Underwritten by: Presented by: GDPR Enacted to Help Protect EU Citizen Data from Risk
  • 8. Underwritten by: Presented by: Privacy Makes Information Governance a Regulatory Issue European Union  The General Data ProtectionRegulation (GDPR) specifically outlines data security and Info Gov. obligations within its legal framework: 1. Data protections must be built into the system “By Design and by Default.” (Recital 78 and Article 25) 2. Data must be secured using technical means (Recital 49 and Articles 5-1(f), 32-1(b-d)) 3. A determination must be made almost immediately as to whether a data breach is likely to have a “high risk to the rights and freedoms of the natural person,” as such a technical environment must be in place to identify, track and assess such breaches. (Recitals 85, 87 and numerous GDPR Articles).You have 72 hours to alert data subjects. 4. Numerous other Recitals and Articles have Info Gov. expectations and demands  Infringement fines can range up to €20,000,000 or 4% of the global revenue of the organization,whichever is higher, PER breach incident or data processing mistake.
  • 9. Underwritten by: Presented by: Privacy Makes Information Governance a Regulatory Issue  One of the greatest challenges in Privacy to legallysupport are the greatly divergent laws, regulations, and expectations:  Industries: e.g., Healthcare(HIPAA /HITECH), Financial(Gramm-Leach-Bliley Act)  US States: e.g., Massachusetts (201 CMR17.00), California (numerous…)  US Regulatory Bodies: e.g., FederalTradeCommission, FederalCommunications Commission, DHHS Officeof Civil Rights, etc.  Other Countries andRegions: e.g., EUDirectiveand GDPR, Canadian PIPEDA, China’s CPL Each statute andregulationcanindividually impact:  The definition of “personaldata.” And there can be morethan one type of personaldata...  How personaldata (of various types…) mustbe secured, stored, located, managed, accessed, controlled, and processed physically and electronically.  And…the legally required breach preparations, breach responsesand timings.  The key is understandingwhat laws the companyis accountable to follow.
  • 10. Underwritten by: Presented by: Privacy Makes Information Governance a Regulatory Issue However, there are key security and technical commonalities across many of the privacy laws and regulations that can be leveraged and reused:  Most privacy laws demand administrativePIdata controls (e.g., polices,procedures,notices)  System designs and builds that integrate privacyand info gov as an early part of the SDLC  AnonymizingorPseudonymizingdata structures/columns  Data minimization/retentionpolicies and automated data deletion/disposal(ERM) processes.Again,back to informationgovernance…  Accurate inventories ofpersonal datatypes,theirlocations/technologies,and their owners  Technical environmentssecured using“reasonable,”“practicable,”“industry-standard,” “state-of-the-art,”“readilyavailable”technologies and procedures(e.g., two-factor authentication foradministrators)  Breach prevention,preparation,notification,and response technologies and processes implemented  Data access minimizationand limitations,segmentingserverenvironments,etc.
  • 11. Underwritten by: Presented by: How Do We Better ConnectLegal Regulationsand Operational Requirementsto Our Content? The first and last mile of retention The First Mile: Retention Considerations The Last Mile: Policy Execution Government regulations Industry specific regulations IT Operations Business Needs Email Cloud Desktop Physical Content SAP Structured Repositories Unstructured repositories File Shares Auto collection of laws Translate to retention rules Centralized policy Apply at scale Audit logs Connect
  • 12. Underwritten by: Presented by: Personal Data is Insidious! (Definition: Gradual, Subtle, Treacherous…)  PI and Sensitive PI seems to exist just about everywhere… It creeps: 1. Typical RDBMS transactionalenvironments (ERP, HR, G/L, etc.) 2. User Laptops (in all types of locations such as email clients, HD folders, Evernote, screenshots, etc.) 3. User Mobile Devices (BYOD and company provided) 4. Shared Drive/Folder Servers 5. External Shared Drives (Box, Dropbox, Box, Egnyte, Googledocs, etc.) 6. Email Systems (InternalExchange, Gmail, Yahoo) 7. Content and “Sharing” services (SharePoint, Office365, Livelink, Documentum, Skype, Jive, Slack) 8. Paper notebooks 9. PLUS all of your third-party information partners and outsourcers (e.g., HIPAA “business associates” and GDPR “data processors”)  Privacy laws still cover all these physical and electronic locations, with very few exceptions  These locations need to be technically, procedurally, and administratively secured
  • 13. Underwritten by: Presented by: Be Mindful of What You Collect, Store, and Process  Data minimiz(s)ation  You can’t lose or have stolen what doesn’t exist  Multiplejurisdictions– U.S., EU, and more – emphasize this point  AIIM’s materialson Records and Information Managementare a great place to help jumpstart your data minimisationand datainventoryefforts  Watch your vendors, too  If you’re sharing data,you’re can be responsible if they lose it or misuse it  Are you auditingthem on a regular basis?  How are those agreements…?
  • 14. Underwritten by: Presented by: Watch What You Collect  Log files and authentication  When you create an account, you create PII  Dataretention: How long do you need to keep that log file?  Physical security issues  Single credentials and employee monitoring  Theft prevention and customer monitoring
  • 15. Underwritten by: Presented by: System Privacy by Design, Privacy by Default The Discussion of Privacy’s and Info Gov’s Impact on Development Begins Here Source: Wikipedia Not Here…!
  • 16. Underwritten by: Presented by: The Intersectionof the SDLC,Information Governance,and Privacy  You design for security and governance; take one step further for privacy by working with the Developers on their efforts:  Impacting the Software Development Lifecycle (SDLC) early directly supports your ability to make your technical environment secure and privacy compliant.  Your developers’ data architecture designs and data transport layer designs may directly impact your ability to secure them. Examples: Table layouts and designs vis-à- vis encryption capabilities for PI-containing columns within the RDBMS.  Irrespective of the SDLC that your company uses (e.g., Agile©), privacy is a key part of the upfront planning and design phases as much as security and usability.
  • 17. Underwritten by: Presented by: HPE Policy Based Secure ContentManagement offering Policy Based Secure Content Management File &contentanalysis ID sensitive data PII, PCI, PHI ROT Analysis Enterprise policy application Manage- in-place Classification Security& access Redaction Retention Disposition Data extraction& applicationretirement Access Reporting ID sensitive data PII, PCI, PHI Redaction Data masking Encryption Decryption
  • 18. Underwritten by: Presented by: Complete Content Platform “Privacy by Design” Analyse Record Repository Classify Data Repositories Messaging EmailFiles Read SharePoint Action Applications Data Warehouses Document Management Data ArchiveSocial Media Web Content Apply Store Eligible Records Declare Data Encryption Find Govern Apply Retention Rules Compliance, Legal Hold & Audit
  • 19. Underwritten by: Presented by: Summary Points  The Info Governancecapability is critical to privacy efforts. Withoutit, privacy operations would be impossibleto conduct.  Coordination and clarity between the CIO, theGC, Privacy, and the Info Gov. groups arerequired to meet privacy obligations. No Person is an island where privacy isconcerned.  Nolaws or regulations require“Superhuman” or “Extraordinary” information governanceor security efforts. Thewords “Practical,” ”Reasonable,” “Industry-standard” arecommonly used. “Proactive” and “By Design” are common themes, however.  Many of the laws and regulations have similar, if not the same, technical, proceduraland administrative security requirements. Leverage them.  There are significantidiosyncrasies, even between U.S. States let alone across countries and industries. Know what is applicable toyour organization. Ask your GeneralCounsel!(and they may not know…).  PI can be in any number of differentrepositories. You’reresponsiblefor securing all of them according to regulatory and legal jurisdictions; not justthe obvious data elements inside of the RDBMS.  If there is incremental $ to spend on privacy and security, you may consider spending it on training and communications for the employees.
  • 20. Underwritten by: Presented by: Greg Reid, CEO CIP, CIPP/US,CIPP/EU, CIPM,ACEDS/eDiscovery Master of Jurisprudence: Information Security and Privacy InFutureLLC Gregory.Reid@InFutureLLC.com https://www.linkedin.com/in/gregoryreid/ Rich Lauwers, Information Governance SME Hewlett Packard Enterprise Rich.Lauwers@hpe.com +1 847.232.3566CST, Chicago Thank You!
  • 21. Underwritten by: Presented by: Take a look at what HPE has to offer www.hpe.com/software/scm HPE GDPR Solutions https://www.hpe.com/us/en/campaigns/gdpr-compliance.html
  • 22.
  • 23. Underwritten by: Presented by: #AIIMInformationIs Your MostImportant Asset. Learn the Skills to Manage It.Information is your most important asset. Learn the skills to manage it.