SlideShare ist ein Scribd-Unternehmen logo
1 von 51
Downloaden Sie, um offline zu lesen
Castlebridge Associates
Castlebridge Associates | Invent Centre | DCU | Glasnevin | Dublin 9| Ireland
Changing How People in Organisations Think about Information
DATA PRIVACY & THE DMBOK
NO NEED TO REINVENT THE WHEEL!
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
WHATWE ARE GOING TO COVER
Why Data Privacy is Important
Data Privacy in the DMBOK
Some Other Concepts
Ethical Information Management
Castlebridge Associates
© 2014 | Castlebridge Associates | Confidential
WHY DATA PRIVACY IS IMPORTANT
SOME KEYTRENDSTO BE AWARE OF…
Castlebridge Associates
© 2014 | Castlebridge Associates | Confidential
People have entrusted us with their most
personal information.
We owe them nothing less than the
best protections that we can possibly
provide by harnessing the technology
at our disposal.
We must get this right.
History has shown us that sacrificing
our right to privacy can have dire
consequences.
Tim Cook, CEO Apple
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
THE GLOBAL LEGISLATIVE TREND
7
17
36
68
111
0
20
40
60
80
100
120
1970s 1980s 1990s 2000s 2010-2015
Total Global Data Privacy Laws
Total Global Data Privacy Law
Within this, there is also continued evolution of existing Data Privacy laws
(e.g. EU Data Protection Regulation)
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
ONE KEY TREND…
Global momentum toward the EU’s model of data privacy regulation has led
to new laws and better protection for the consumer. Many non-EU countries
have passed laws over the past 12 months that bring the world’s collective standards
around data privacy closer to the high-water mark laid out by the EU’s
overarching Privacy Directive.
For instance, countries such as Malaysia and South Africa have recently passed new data
privacy frameworks that closely follow the EU’s lead. South Africa has even gone one step
farther and implemented provisions that will likely be implemented by the future EU
Privacy Directive updates.
- Forrester,August 2014
© 2015 | Castlebridge Associates | Confidential
A FRAMEWORK FORTHINKING ABOUT INFORMATION
Strategic
Business Information Technology
TacticalOperationsCustomer
Business
Strategy &
Governance
Information
Strategy &
Governance
IT Strategy &
Governance
Business
Architecture &
Planning
Information
Architecture &
Planning
Technology
Architecture &
Planning
Management &
Execution of
Business
Processes
Management &
Application of
Information
Management &
Exploitation of
IT Services
Process Outcome Information Outcome
Expectation
Based on Amsterdam 9-box model by Prof. Rik Maes et al
Privacy is Here
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
A SUMMARY MAPPING OF CORE PRINCIPLES
EU Principle OECD Principle(s) AICPA FIPP
Obtain Data Fairly Openness Notice ; Choice and Consent
Process for a Specified and Lawful
Purpose Purpose Specification Collection
Do not Process for an incompatible
purpose Use Limitation Use, Retention, Disposal
Ensure Data is Accurate,
Complete,and Up-to-date Data Quality Quality
Personal Data should be kept Safe
and Secure Security Safeguards Security for Privacy; Disclosure
Data must be adequate,relevant,
not excessive Data Quailty Quality
Personal data must not be kept for
longer than necessary for the
specified purposes Use, Retention, Disposal
Individuals have rights of access,
rectification,erasure, blocking Individual participation Access
Management; Monitoring & Enforcement
Penalties & Civil liability &
Enforcement Accountability Monitoring & Enforcement
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
One Stop Shop
KEY PROVISIONS OF THE DATA PROTECTION
REGULATION
Core 8 Principles
+
Accountability Principle
+
Transparency Principle
+
Article 7, 8 ECHR
Increased
Penalties
Moves towards a “Risk
Based” model
Explicit
Focus on
Governance
Principles
Driven
Principles
Driven
Enhanced Rights:
Data Portability;
RTBF;
Risk & Penalty
Mitigation
Documentation
Risk & Penalty
Mitigation
Fines as
% of
Global
Turnover
General Data Protection Regulation – 1 Slide Summary
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
WHY DOES IT MATTER?
Castlebridge Associates
© 2014 | Castlebridge Associates | Confidential
DATA PRIVACY IN THE DMBOK
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
DATA PRIVACY IN THE DMBOK WHEEL
© DAMA International, used with permission
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
DATA PRIVACY IN THE DMBOK WHEEL
Remember to Respect Copyright
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
DATA PRIVACY IN THE DMBOK WHEEL
© DAMA International, used with permission
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
DATA PROTECTIONTHROUGH THE DG/IQ LENS
Current EU Data Protection
Directive 95/46/EC
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
DATA PROTECTION: PRINCIPLES
Principle Governance Quality
Personal data which is being processed must be fairly
obtained and processed
X
Personal Data shall be obtained for a Specified and Lawful
Purpose
X
Personal Data shall not be processed in a manner
incompatible with the specified purpose
X
Personal Data shall be kept accurate and complete and,
where necessary, kept up to date
X
Personal Data should be kept Safe & Secure X
Data processed must be adequate, relevant and not
excessive
X X
Personal data should not be kept for longer than
necessary for the specified purpose or purposes
X X
Data Subjects have a right of Access. X
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
DATA PROTECTION: QUALITY PRINCIPLES
Principle Governance Quality
Personal data which is being processed must be fairly
obtained and processed
X
Personal Data shall be obtained for a Specified and Lawful
Purpose
X
Personal Data shall not be processed in a manner
incompatible with the specified purpose
X
Personal Data shall be kept accurate and complete and,
where necessary, kept up to date
X
Personal Data should be kept Safe & Secure X
Data processed must be adequate, relevant and not
excessive
X X
Personal data should not be kept for longer than
necessary for the specified purpose or purposes
X X
Data Subjects have a right of Access. X
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
WHAT IS DATA QUALITY IN DMBOK?
Definition:
Planning, implementation, and control activities that
apply quality management techniques to measure,
assess, improve, and ensure the fitness of data for use.
.
Goals:
• To measurably improve the quality of data in relation to
defined business expectations.
• To define requirements and specifications for integrating data
quality control into the system development lifecycle.
• To provide defined processes for measuring, monitoring, and
reporting conformance to acceptable levels of data quality.
Activities:
1. Develop and Promote Data Quality Awareness
2. Define Data Quality Requirements
3. Profile, Analyze, and Assess Data Quality
4. Define Data Quality Metrics
5. Define Data Quality Business Rules
6. Test and Validate Data Quality Requirements
7. Set and Evaluate Data Quality Service Levels
8. Continuously Measure and Monitor Data Quality
9. Manage Data Quality Issues
10. Clean and Correct Data Quality Defects
11. Design and Implement Operational DQM Procedures
12. Monitor Operational DQM Procedures and Performance
Inputs Outputs
Inputs:
• Business Requirements
• Data Requirements
• Data Quality Expectations
• Data Policies and Standards
• Business Metadata
• Technical Metadata
• Data Sources and Data Stores
Primary Deliverables:
• Improved Quality Data
• Data Management
• Operational Analysis
• Data Profiles
• Data Quality Certification
Reports
• Data Quality Service Level
• Agreements
Metrics:
• Data Value Statistics
• Errors / Requirement Violations
• Conformance to Expectations
• Conformance to Service Levels
Tools:
• Data Profiling Tools
• Statistical Analysis Tools
• Data Cleansing Tools
• Data Integration Tools
• Issue and Event Management Tools
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
EXAMPLE: MARKETING CONSENTS EXPIRE AFTER 12 MONTHS
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
12 months or
over
10 -12 Months 6-9 months 3-6 months 0-3 months
Marketing Months since last contact
ePrivacy Directive ConsentTracker
30% x Avg uplift of €10 per campaign, 10% success rate, 1.2 million customers
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
DATA PRIVACY IN THE DMBOK WHEEL
© DAMA International, used with permission
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
DATA PROTECTION: DATA DEVELOPMENT
Principle Governance Quality
Personal data which is being processed must be fairly
obtained and processed
X
Personal Data shall be obtained for a Specified and Lawful
Purpose
X
Personal Data shall not be processed in a manner
incompatible with the specified purpose
X
Personal Data shall be kept accurate and complete and,
where necessary, kept up to date
X
Personal Data should be kept Safe & Secure X
Data processed must be adequate, relevant and not
excessive
X X
Personal data should not be kept for longer than
necessary for the specified purpose or purposes
X X
Data Subjects have a right of Access. X
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
WHAT IS DATA DEVELOPMENT IN DMBOK?
Definition:
Designing, implementing, and maintaining solutions to
meet the data needs of the enterprise.
.
Goals:
• Identify and define data requirements.
• Design data structures and other solutions to these requirements.
• Implement and maintain solution components that meet these
requirements.
• Ensure solution conformance to data architecture and standards as
appropriate.
• Ensure the integrity, security, usability, and maintainability of structured data
assets.
Activities:
1. Data Modelling, Analysis and Solution Design
• Analyze Information Requirements
• Develop and Maintain Conceptual Data Models
• Develop and Maintain Logical Data Models
• Develop and Maintain Physical Data Models
2. Detailed Data Design
• Design Physical Databases
• Design Information Products
• Design Data Access Services
• Design Data Integration Services
3. Data Model and Design Quality Management
• Develop Data Modeling and Design Standards
• Review Data Model and Database Design Quality
• Manage Data Model Versioning and Integration
4. Data Implementation
• Build and test Data Access Services
• Validate Information Requirements
Inputs Outputs
Inputs:
• Business Goals and Strategies
• Data Needs and Strategies
• Data Standards
• Data Architecture
• Process Architecture
• Application Architecture
• Technical Architecture
Primary Deliverables:
• Data Requirements and
Business Rules
• Conceptual Data Models
• Logical Data Models and
Specifications
• Physical Data Models and
Specifications
• Meta-data (Business and
Technical)
• Data Access Services
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
HOW DATA DEVELOPMENT AFFECTS PRIVACY
Obtain
Storage
Store/Share Apply
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
HOW DATA DEVELOPMENT AFFECTS PRIVACY -
EXAMPLE
• EU e-marketing rules require explicit Opt-in consent for calls
to mobiles and for SMS marketing
• Fixed line is Opt-out
• Data Modelling decision required here…
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
HOW DATA DEVELOPMENT AFFECTS PRIVACY -
EXAMPLE
Marketing Other
Call
SMS
Call
Opt-in
Is this a nominated contact
for that purpose?
Purposes
Service Delivery
Record opt-in for service
delivery calls
Opt-in
Is this a nominated contact
for that purpose?
Record opt-in for service
delivery calls
Opt Out Record opt-in for service
delivery calls
Is this a nominated contact
for that purpose?
Email Opt-in Record opt-in for service
delivery calls
Is this a nominated contact
for that purpose?
Postal Opt-Out Record opt-in for service
delivery calls
Is this a nominated contact
for that purpose?
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
HOW DATA DEVELOPMENT AFFECTS PRIVACY –
A KISS OF DEATHTO USEABLE DATA…
Please tick this box if you would like us to not contact you
Blanket Opt-Outs applied at the PARTY Entity level, not at the contact point or in
the context of a specific purpose….
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
WHAT CAN WE LEARN FROM DATA MODEL
ABOUT PRIVACY IMPACTS?
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
DATA PRIVACY IN THE DMBOK WHEEL
© DAMA International, used with permission
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
WHAT IS DATA ARCHITECTURE IN DMBOK?
Definition:
Defining the data needs of the enterprise
and designing the master blueprints to
meet those needs..
Goals:
• To plan with vision and foresight to provide high quality data.
• To identify and define common data requirements.
• To design conceptual structures and plans to meet the current
and long-term data requirements of the enterprise.
Activities:
1. Understand Enterprise Information Needs
2. Develop and Maintain the Enterprise Data Model
3. Analyze and AlignWith Other Business Models
4. Define and Maintain the DataTechnology Architecture
5. Define and Maintain the Data Integration Architecture
6. Define and Maintain the DW/BI Architecture
7. Define and Maintain EnterpriseTaxonomies and
Namespaces
8. Define and Maintain the Meta-data Architecture
Inputs Outputs
Inputs:
• Business Goals
• Business Strategies
• Business Architecture
• Process Architecture
• IT Objectives
• IT Strategies
• Data Strategies
• Data Issues
• Data Needs
• Technical Architecture
Primary Deliverables:
• Enterprise Data Model
• Information Value Chain
Analysis
• Data Technology Architecture
• Data Integration / MDM
Architecture
• DW / BI Architecture
• Meta-data Architecture
• Enterprise Taxonomies and
Namespaces
• Document Management
Architecture
• Metadata
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
DATA PROTECTION: DATA ARCHITECTURE
Principle Governance Quality
Personal data which is being processed must be fairly
obtained and processed
X
Personal Data shall be obtained for a Specified and Lawful
Purpose
X
Personal Data shall not be processed in a manner
incompatible with the specified purpose
X
Personal Data shall be kept accurate and complete and,
where necessary, kept up to date
X
Personal Data should be kept Safe & Secure X
Data processed must be adequate, relevant and not
excessive
X X
Personal data should not be kept for longer than
necessary for the specified purpose or purposes
X X
Data Subjects have a right of Access. X
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
THE ZACHMAN FRAMEWORK
Executive
Business
Manager
Architect
Engineer
Technician
How
(Action)
Why
(Motivation)
Where
(Location)
When
(Event)
Who
(Actor)
What
(Data)
Enterprise
Scope
Context
Business
Concepts
System
Logic
Technology
Physics
Tool
components
Enterprise
Inventory
Identification
Inventory
Definition
Inventory
Representation
Inventory
Specification
Inventory
Configuration
Inventory
Instantiation
Process
Identification
Process
Definition
Process
Representation
Process
Specification
Process
Configuration
Process
Instantiations
Distribution
Identification
Distribution
Definition
Distribution
Representation
Distribution
Specification
Distribution
Configuration
Distribution
Instantiations
Responsibility
Identification
Responsibility
Definition
Responsibility
Representation
Responsibility
Specification
Responsibility
Configuration
Distribution
Instantiations
Timing
Identification
Timing
Definition
Timing
Representation
Timing
Specification
Timing
Configuration
Timing
Instantiations
Motivation
Identification
Motivation
Definition
Motivation
Representation
Motivation
Specification
Motivation
Configuration
Motivation
Instantiations
Inventory Sets Process flows
Distribution
Networks
Responsibility
Assignments
Timing Cycles
Motivation
Intentions
Based on the Zachman Framework and content from
Dennedy & Finneran’s Privacy Engineers Manifesto
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
THE ZACHMAN FRAMEWORK
Executive
Business
Manager
Architect
Engineer
Technician
How
(Action)
Why
(Motivation)
Where
(Location)
When
(Event)
Who
(Actor)
What
(Data)
Enterprise
Scope
Context
Business
Concepts
System
Logic
Technology
Physics
Tool
components
Enterprise
Inventory
Identification
Inventory
Definition
Inventory
Representation
Inventory
Specification
Inventory
Configuration
Inventory
Instantiation
Process
Identification
Process
Definition
Process
Representation
Process
Specification
Process
Configuration
Process
Instantiations
Distribution
Identification
Distribution
Definition
Distribution
Representation
Distribution
Specification
Distribution
Configuration
Distribution
Instantiations
Responsibility
Identification
Responsibility
Definition
Responsibility
Representation
Responsibility
Specification
Responsibility
Configuration
Distribution
Instantiations
Timing
Identification
Timing
Definition
Timing
Representation
Timing
Specification
Timing
Configuration
Timing
Instantiations
Motivation
Identification
Motivation
Definition
Motivation
Representation
Motivation
Specification
Motivation
Configuration
Motivation
Instantiations
Inventory Sets Process flows
Distribution
Networks
Responsibility
Assignments
Timing Cycles
Motivation
Intentions
What triggers
need for data?
Timing
Identification
Motivation
Identification
• Why?
• Balancing
priorities/goals
• Purpose spec
Specified data,
specified
purpose
Specified data,
specified
purpose
Based on the Zachman Framework and content from
Dennedy & Finneran’s Privacy Engineers Manifesto
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
THE ZACHMAN FRAMEWORK
Executive
Business
Manager
Architect
Engineer
Technician
How
(Action)
Why
(Motivation)
Where
(Location)
When
(Event)
Who
(Actor)
What
(Data)
Enterprise
Scope
Context
Business
Concepts
System
Logic
Technology
Physics
Tool
components
Enterprise
Inventory
Identification
Inventory
Definition
Inventory
Representation
Inventory
Specification
Inventory
Configuration
Inventory
Instantiation
Process
Identification
Process
Definition
Process
Representation
Process
Specification
Process
Configuration
Process
Instantiations
Distribution
Identification
Distribution
Definition
Distribution
Representation
Distribution
Specification
Distribution
Configuration
Distribution
Instantiations
Responsibility
Identification
Responsibility
Definition
Responsibility
Representation
Responsibility
Specification
Responsibility
Configuration
Distribution
Instantiations
Timing
Identification
Timing
Definition
Timing
Representation
Timing
Specification
Timing
Configuration
Timing
Instantiations
Motivation
Identification
Motivation
Definition
Motivation
Representation
Motivation
Specification
Motivation
Configuration
Motivation
Instantiations
Inventory Sets Process flows
Distribution
Networks
Responsibility
Assignments
Timing Cycles
Motivation
Intentions
Data
Classification
IN CONTEXT
How does the
purpose get
executed?
Based on the Zachman Framework and content from
Dennedy & Finneran’s Privacy Engineers Manifesto
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
THE ZACHMAN FRAMEWORK
Executive
Business
Manager
Architect
Engineer
Technician
How
(Action)
Why
(Motivation)
Where
(Location)
When
(Event)
Who
(Actor)
What
(Data)
Enterprise
Scope
Context
Business
Concepts
System
Logic
Technology
Physics
Tool
components
Enterprise
Inventory
Identification
Inventory
Definition
Inventory
Representation
Inventory
Specification
Inventory
Configuration
Inventory
Instantiation
Process
Identification
Process
Definition
Process
Representation
Process
Specification
Process
Configuration
Process
Instantiations
Distribution
Identification
Distribution
Definition
Distribution
Representation
Distribution
Specification
Distribution
Configuration
Distribution
Instantiations
Responsibility
Identification
Responsibility
Definition
Responsibility
Representation
Responsibility
Specification
Responsibility
Configuration
Distribution
Instantiations
Timing
Identification
Timing
Definition
Timing
Representation
Timing
Specification
Timing
Configuration
Timing
Instantiations
Motivation
Identification
Motivation
Definition
Motivation
Representation
Motivation
Specification
Motivation
Configuration
Motivation
Instantiations
Inventory Sets Process flows
Distribution
Networks
Responsibility
Assignments
Timing Cycles
Motivation
Intentions
Logical Schema Process Maps /
Data Flow
RACI Matrix
Based on the Zachman Framework and content from
Dennedy & Finneran’s Privacy Engineers Manifesto
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
THE ZACHMAN FRAMEWORK
Executive
Business
Manager
Architect
Engineer
Technician
How
(Action)
Why
(Motivation)
Where
(Location)
When
(Event)
Who
(Actor)
What
(Data)
Enterprise
Scope
Context
Business
Concepts
System
Logic
Technology
Physics
Tool
components
Enterprise
Inventory
Identification
Inventory
Definition
Inventory
Representation
Inventory
Specification
Inventory
Configuration
Invntory
Instantiation
Process
Identification
Process
Definition
Process
Representation
Process
Specification
Process
Configuration
Process
Instantiations
Distribution
Identification
Distribution
Definition
Distribution
Representation
Distribution
Specification
Distribution
Configuration
Distribution
Instantiations
Responsibility
Identification
Responsibility
Definition
Responsibility
Representation
Responsibility
Specification
Responsibility
Configuration
Distribution
Instantiations
Timing
Identification
Timing
Definition
Timing
Representation
Timing
Specification
Timing
Configuration
Timing
Instantiations
Motivation
Identification
Motivation
Definition
Motivation
Representation
Motivation
Specification
Motivation
Configuration
Motivation
Instantiations
Inventory Sets Process flows
Distribution
Networks
Responsibility
Assignments
Timing Cycles
Motivation
Intentions
Where is your
data stored?
What rules apply
to that storage?
Based on the Zachman Framework and content from
Dennedy & Finneran’s Privacy Engineers Manifesto
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
DATA PRIVACY IN THE DMBOK WHEEL
© DAMA International, used with permission
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
DATA PROTECTION: DATA GOVERNANCE
Principle Governance Quality
Personal data which is being processed must be fairly
obtained and processed
X
Personal Data shall be obtained for a Specified and Lawful
Purpose
X
Personal Data shall not be processed in a manner
incompatible with the specified purpose
X
Personal Data shall be kept accurate and complete and,
where necessary, kept up to date
X
Personal Data should be kept Safe & Secure X
Data processed must be adequate, relevant and not
excessive
X X
Personal data should not be kept for longer than
necessary for the specified purpose or purposes
X X
Data Subjects have a right of Access. X
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
WHAT IS DATA GOVERNANCE IN DMBOK?
Definition:
The exercise of authority and
control (planning, monitoring, and
enforcement) over the management
of data assets..
Goals:
• To define, approve, and communicate data strategies, policies, standards, architecture, procedures,
and metrics.
• To track and enforce regulatory compliance and conformance to data policies, standards, architecture,
and procedures.
• To sponsor, track, and oversee the delivery of data management projects and services.
• To manage and resolve data related issues.
• To understand and promote the value of data assets..
Activities:
1. Data Management Planning
• Understand Strategic Enterprise Data Needs
• Develop and Maintain the Data Strategy
• Establish Data Professional Roles and Organizations
• Identify and Appoint Data Stewards
• Establish Data Governance and Stewardship Organizations
• Develop and Approve Data Policies, Standards, and Procedures
• Review and Approve Data Architecture
• Plan and Sponsor Data Management Projects and Services
• Estimate Data Asset Value and Associated Costs
2. Data Management Control
• Supervise Data Professional Organizations and Staff
• Coordinate Data Governance Activities
• Manage and Resolve Data Related Issues
• Monitor and Ensure Regulatory Compliance
• Monitor and Enforce Conformance With Data Policies, Standards,
• and Architecture
• Oversee Data Management Projects and Services
• Communicate and Promote the Value of Data Assets
Inputs Outputs
Inputs:
• Business Goals
• Business Strategies
• IT Objectives
• IT Strategies
• Data Needs
• Data Issues
• Regulatory Requirements
Primary Deliverables:
• Data Policies
• Data Standards
• Resolved Issues
• Data Management Projects and
Services
• Quality Data and Information
• Recognized Data Value
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
SOME KEY GOVERNANCE FUNCTIONS FROM
PRIVACY PERSPECTIVE
 Co-ordination of Data Privacy policies and standards
 ISO29100 is a good core starting point
 Ensuring staff are trained
 Acting as “honest broker”
 Ensuring appropriate risk posture in relation to privacy compliance
 Ensuring processes for personal data are documented
 Ensuring key controls are defined, operate, and are validated
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
STEWARDSHIP FOR DATA PRIVACY
Strategic
Operational
Tactical
Doers Definers Deciders Co-ordinators
  
   
  
3DC Stewardship
Defined not by WHERE they are in organisation, but by ROLE in relation to Information
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
A DATA STEWARDSHIP MIND MAP
Governance &
Stewardship
Data Use Steward
(Doer/Definer)
UX Requirements
Privacy Reporting
Screens & Reports Quality
Screen & Reports Content
Design & Aesthetics
Data Governance Reqts
(Co-ordinator)
Data Standards Compliance
Use of Metadata Documentation
Metric Driven Quality Assurance
Data Management Structure
Data Collection
Steward
(Doer/Definer)
Data Classification (PII, Sensitive)
Encryption
Business Content Rules
Privacy Rules
Privacy Reqts
Steward
(Decider/Definer)
Purpose
Notice
Consent
Transfer (3rd Party)
Access/Correction/Deletion
Proportionality
Retention
Responsible Action
Based on work by M. Dennedy & Tom Finneran
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
THE DATA PROTECTION OFFICER ROLE
• On the Executive Board?
• Reporting to Executive Board?
• Must be Independent
• Technical and Business skills
• Accountable for the System of Governance
• “StatutoryTenure”
Castlebridge Associates
© 2014 | Castlebridge Associates | Confidential
SOME FINAL CONCEPTS
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
PRIVACY BY DESIGN
What is it?
Privacy by Design is a philosophy for systems engineering
which takes privacy into account throughout the whole
engineering process.
Why is it Important?
Privacy by Design establishes 7 guiding principles for
development of systems that respect and enhance privacy as a
quality system
What is it?
It is just QUALITY MANAGEMENT applied to Information,
with PRIVACY as a “critical to quality” characteristic
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
PRIVACY BY DESIGN
'You cannot inspect
quality into a product.'
The quality is there or it
isn't by the time it's
inspected.
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
PRIVACY BY DESIGN
Focus on defining
processes & rules, not
correcting errors
Privacy as a quality
characteristic
A function of process
design, not an after
thought
Things need to work
without undue
invasion of privacy
Information Asset Life
Cycle thinking
Communicate,
Document,
communicate more!
Focus on the Customer –
Customer determines
Quality /Privacy
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
PRIVACY ENGINEERING
What is it?
Privacy Engineering is the discipline that ensures the
gathering and application of privacy requirements has
the same primacy as other ‘functional’ requirements in
processes and systems and incorporates them into the
project, product, system, or information life cycle.
Why is it Important? It is the glue that makes PBD operative in an organisation
What is it?
It is just QUALITY ENGINEERING applied to Information,
with PRIVACY as a “critical to quality” characteristic
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
ELEMENTS OF PRIVACY ENGINEERING MAPPED TO
JURAN
Enterprise Goals
User Goals
Privacy Policy
Requirements
Policies and
Procedures
Privacy
Mechanisms
Privacy Awareness
Training
Quality Assurance
QA Feedback
Improvement
Castlebridge Associates
© 2014 | Castlebridge Associates | Confidential
ETHICAL INFORMATION
MANAGEMENT
THE NEW EIM
Castlebridge Associates
© 2015 | Castlebridge Associates | Confidential
Business Information Technology
Society’s Ethical Framework
Organisation’s Ethical Framework
Regulation
& Laws
Lobbying
StrategicTacticalOperationsCustomer
Standards &
Codes
Standard
Practices
Business
Strategy &
Governance
Information
Strategy &
Governance
IT Strategy &
Governance
Business
Architecture &
Planning
Information
Architecture &
Planning
Technology
Architecture &
Planning
Management &
Execution of
Business
Processes
Management &
Application of
Information
Management &
Exploitation of
IT Services
Process Outcome Information Outcome
Customer
Feedback
Customer
Education
Expectation
Business Information Technology

Weitere ähnliche Inhalte

Was ist angesagt?

How to Build & Sustain a Data Governance Operating Model
How to Build & Sustain a Data Governance Operating Model How to Build & Sustain a Data Governance Operating Model
How to Build & Sustain a Data Governance Operating Model DATUM LLC
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best PracticesDATAVERSITY
 
Data Warehouse or Data Lake, Which Do I Choose?
Data Warehouse or Data Lake, Which Do I Choose?Data Warehouse or Data Lake, Which Do I Choose?
Data Warehouse or Data Lake, Which Do I Choose?DATAVERSITY
 
Strategic Business Requirements for Master Data Management Systems
Strategic Business Requirements for Master Data Management SystemsStrategic Business Requirements for Master Data Management Systems
Strategic Business Requirements for Master Data Management SystemsBoris Otto
 
Chapter 3: Data Governance
Chapter 3: Data Governance Chapter 3: Data Governance
Chapter 3: Data Governance Ahmed Alorage
 
Data-Ed Online: Approaching Data Quality
Data-Ed Online: Approaching Data QualityData-Ed Online: Approaching Data Quality
Data-Ed Online: Approaching Data QualityDATAVERSITY
 
Introduction to DCAM, the Data Management Capability Assessment Model - Editi...
Introduction to DCAM, the Data Management Capability Assessment Model - Editi...Introduction to DCAM, the Data Management Capability Assessment Model - Editi...
Introduction to DCAM, the Data Management Capability Assessment Model - Editi...Element22
 
‏‏‏‏‏‏‏‏Chapter 11: Meta-data Management
‏‏‏‏‏‏‏‏Chapter 11: Meta-data Management‏‏‏‏‏‏‏‏Chapter 11: Meta-data Management
‏‏‏‏‏‏‏‏Chapter 11: Meta-data ManagementAhmed Alorage
 
Chapter 5: Data Development
Chapter 5: Data Development Chapter 5: Data Development
Chapter 5: Data Development Ahmed Alorage
 
Data Governance Best Practices
Data Governance Best PracticesData Governance Best Practices
Data Governance Best PracticesDATAVERSITY
 
‏‏Chapter 8: Reference and Master Data Management
‏‏Chapter 8: Reference and Master Data Management ‏‏Chapter 8: Reference and Master Data Management
‏‏Chapter 8: Reference and Master Data Management Ahmed Alorage
 
Chapter 7: Data Security Management
Chapter 7: Data Security ManagementChapter 7: Data Security Management
Chapter 7: Data Security ManagementAhmed Alorage
 
Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...
Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...
Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...DATAVERSITY
 
Activate Data Governance Using the Data Catalog
Activate Data Governance Using the Data CatalogActivate Data Governance Using the Data Catalog
Activate Data Governance Using the Data CatalogDATAVERSITY
 
Real-World Data Governance: Data Governance Expectations
Real-World Data Governance: Data Governance ExpectationsReal-World Data Governance: Data Governance Expectations
Real-World Data Governance: Data Governance ExpectationsDATAVERSITY
 
Data Governance Best Practices, Assessments, and Roadmaps
Data Governance Best Practices, Assessments, and RoadmapsData Governance Best Practices, Assessments, and Roadmaps
Data Governance Best Practices, Assessments, and RoadmapsDATAVERSITY
 
Data Catalog as a Business Enabler
Data Catalog as a Business EnablerData Catalog as a Business Enabler
Data Catalog as a Business EnablerSrinivasan Sankar
 
Measuring Data Quality Return on Investment
Measuring Data Quality Return on InvestmentMeasuring Data Quality Return on Investment
Measuring Data Quality Return on InvestmentDATAVERSITY
 
Data, Information And Knowledge Management Framework And The Data Management ...
Data, Information And Knowledge Management Framework And The Data Management ...Data, Information And Knowledge Management Framework And The Data Management ...
Data, Information And Knowledge Management Framework And The Data Management ...Alan McSweeney
 
Data Mesh for Dinner
Data Mesh for DinnerData Mesh for Dinner
Data Mesh for DinnerKent Graziano
 

Was ist angesagt? (20)

How to Build & Sustain a Data Governance Operating Model
How to Build & Sustain a Data Governance Operating Model How to Build & Sustain a Data Governance Operating Model
How to Build & Sustain a Data Governance Operating Model
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best Practices
 
Data Warehouse or Data Lake, Which Do I Choose?
Data Warehouse or Data Lake, Which Do I Choose?Data Warehouse or Data Lake, Which Do I Choose?
Data Warehouse or Data Lake, Which Do I Choose?
 
Strategic Business Requirements for Master Data Management Systems
Strategic Business Requirements for Master Data Management SystemsStrategic Business Requirements for Master Data Management Systems
Strategic Business Requirements for Master Data Management Systems
 
Chapter 3: Data Governance
Chapter 3: Data Governance Chapter 3: Data Governance
Chapter 3: Data Governance
 
Data-Ed Online: Approaching Data Quality
Data-Ed Online: Approaching Data QualityData-Ed Online: Approaching Data Quality
Data-Ed Online: Approaching Data Quality
 
Introduction to DCAM, the Data Management Capability Assessment Model - Editi...
Introduction to DCAM, the Data Management Capability Assessment Model - Editi...Introduction to DCAM, the Data Management Capability Assessment Model - Editi...
Introduction to DCAM, the Data Management Capability Assessment Model - Editi...
 
‏‏‏‏‏‏‏‏Chapter 11: Meta-data Management
‏‏‏‏‏‏‏‏Chapter 11: Meta-data Management‏‏‏‏‏‏‏‏Chapter 11: Meta-data Management
‏‏‏‏‏‏‏‏Chapter 11: Meta-data Management
 
Chapter 5: Data Development
Chapter 5: Data Development Chapter 5: Data Development
Chapter 5: Data Development
 
Data Governance Best Practices
Data Governance Best PracticesData Governance Best Practices
Data Governance Best Practices
 
‏‏Chapter 8: Reference and Master Data Management
‏‏Chapter 8: Reference and Master Data Management ‏‏Chapter 8: Reference and Master Data Management
‏‏Chapter 8: Reference and Master Data Management
 
Chapter 7: Data Security Management
Chapter 7: Data Security ManagementChapter 7: Data Security Management
Chapter 7: Data Security Management
 
Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...
Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...
Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...
 
Activate Data Governance Using the Data Catalog
Activate Data Governance Using the Data CatalogActivate Data Governance Using the Data Catalog
Activate Data Governance Using the Data Catalog
 
Real-World Data Governance: Data Governance Expectations
Real-World Data Governance: Data Governance ExpectationsReal-World Data Governance: Data Governance Expectations
Real-World Data Governance: Data Governance Expectations
 
Data Governance Best Practices, Assessments, and Roadmaps
Data Governance Best Practices, Assessments, and RoadmapsData Governance Best Practices, Assessments, and Roadmaps
Data Governance Best Practices, Assessments, and Roadmaps
 
Data Catalog as a Business Enabler
Data Catalog as a Business EnablerData Catalog as a Business Enabler
Data Catalog as a Business Enabler
 
Measuring Data Quality Return on Investment
Measuring Data Quality Return on InvestmentMeasuring Data Quality Return on Investment
Measuring Data Quality Return on Investment
 
Data, Information And Knowledge Management Framework And The Data Management ...
Data, Information And Knowledge Management Framework And The Data Management ...Data, Information And Knowledge Management Framework And The Data Management ...
Data, Information And Knowledge Management Framework And The Data Management ...
 
Data Mesh for Dinner
Data Mesh for DinnerData Mesh for Dinner
Data Mesh for Dinner
 

Andere mochten auch

DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...Christopher Bradley
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyThoughtworks
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
Recent Privacy and Data Protection Developments in Latin America and Their Im...
Recent Privacy and Data Protection Developments in Latin America and Their Im...Recent Privacy and Data Protection Developments in Latin America and Their Im...
Recent Privacy and Data Protection Developments in Latin America and Their Im...Cédric Laurant
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data miningharithavijay94
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
CDMP preparation workshop EDW2016
CDMP preparation workshop EDW2016CDMP preparation workshop EDW2016
CDMP preparation workshop EDW2016Christopher Bradley
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
Helpful Review Recommendation (리뷰 추천시스템)
Helpful Review Recommendation (리뷰 추천시스템)Helpful Review Recommendation (리뷰 추천시스템)
Helpful Review Recommendation (리뷰 추천시스템)FAST CAMPUS
 
Naive bayes model을 활용한 영화 별점 예측 시스템
Naive bayes model을 활용한 영화 별점 예측 시스템Naive bayes model을 활용한 영화 별점 예측 시스템
Naive bayes model을 활용한 영화 별점 예측 시스템FAST CAMPUS
 
2016 ISACA NACACS - Audit Privacy Considerations
2016 ISACA NACACS - Audit Privacy Considerations2016 ISACA NACACS - Audit Privacy Considerations
2016 ISACA NACACS - Audit Privacy ConsiderationsNathan Anderson
 
欧洲隐私与数据保护(EU privacy and data protection)
欧洲隐私与数据保护(EU privacy and data protection)欧洲隐私与数据保护(EU privacy and data protection)
欧洲隐私与数据保护(EU privacy and data protection)Aron Shannon
 
Review of Data Management Maturity Models
Review of Data Management Maturity ModelsReview of Data Management Maturity Models
Review of Data Management Maturity ModelsAlan McSweeney
 

Andere mochten auch (19)

DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Recent Privacy and Data Protection Developments in Latin America and Their Im...
Recent Privacy and Data Protection Developments in Latin America and Their Im...Recent Privacy and Data Protection Developments in Latin America and Their Im...
Recent Privacy and Data Protection Developments in Latin America and Their Im...
 
Opensource apm scouter in practice
Opensource apm scouter in practiceOpensource apm scouter in practice
Opensource apm scouter in practice
 
Data privacy and digital strategy
Data privacy and digital strategyData privacy and digital strategy
Data privacy and digital strategy
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Data protection act
Data protection act Data protection act
Data protection act
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data mining
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
CDMP preparation workshop EDW2016
CDMP preparation workshop EDW2016CDMP preparation workshop EDW2016
CDMP preparation workshop EDW2016
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Helpful Review Recommendation (리뷰 추천시스템)
Helpful Review Recommendation (리뷰 추천시스템)Helpful Review Recommendation (리뷰 추천시스템)
Helpful Review Recommendation (리뷰 추천시스템)
 
Naive bayes model을 활용한 영화 별점 예측 시스템
Naive bayes model을 활용한 영화 별점 예측 시스템Naive bayes model을 활용한 영화 별점 예측 시스템
Naive bayes model을 활용한 영화 별점 예측 시스템
 
2016 ISACA NACACS - Audit Privacy Considerations
2016 ISACA NACACS - Audit Privacy Considerations2016 ISACA NACACS - Audit Privacy Considerations
2016 ISACA NACACS - Audit Privacy Considerations
 
欧洲隐私与数据保护(EU privacy and data protection)
欧洲隐私与数据保护(EU privacy and data protection)欧洲隐私与数据保护(EU privacy and data protection)
欧洲隐私与数据保护(EU privacy and data protection)
 
Review of Data Management Maturity Models
Review of Data Management Maturity ModelsReview of Data Management Maturity Models
Review of Data Management Maturity Models
 

Ähnlich wie Data Privacy in the DMBOK - No Need to Reinvent the Wheel

Privacy Advisory Service
Privacy Advisory ServicePrivacy Advisory Service
Privacy Advisory ServiceIron Mountain
 
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...TrustArc
 
Sabre: Mastering a strong foundation for operational excellence and enhanced ...
Sabre: Mastering a strong foundation for operational excellence and enhanced ...Sabre: Mastering a strong foundation for operational excellence and enhanced ...
Sabre: Mastering a strong foundation for operational excellence and enhanced ...Orchestra Networks
 
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]TrustArc
 
GDPR and Data Quality - A Service Objects webinar
GDPR and Data Quality - A Service Objects webinarGDPR and Data Quality - A Service Objects webinar
GDPR and Data Quality - A Service Objects webinarRob Manser
 
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Delphix
 
Whos role is it anyway
Whos role is it anywayWhos role is it anyway
Whos role is it anywayIRIS
 
Skylads - Big Data for Telcos
Skylads - Big Data for TelcosSkylads - Big Data for Telcos
Skylads - Big Data for TelcosXavier Litt
 
Key Considerations for Outsourcing Data Collection Services
Key Considerations for Outsourcing Data Collection ServicesKey Considerations for Outsourcing Data Collection Services
Key Considerations for Outsourcing Data Collection ServicesAndrew Leo
 
The journey to trusted data and better decisions
The journey to trusted data and better decisionsThe journey to trusted data and better decisions
The journey to trusted data and better decisionsFelix Liao
 
( Big ) Data Management - Governance - Global concepts in 5 slides
( Big ) Data Management - Governance - Global concepts in 5 slides( Big ) Data Management - Governance - Global concepts in 5 slides
( Big ) Data Management - Governance - Global concepts in 5 slidesNicolas Sarramagna
 
How to Standardize Organization-Wide Data Collection
How to Standardize Organization-Wide Data CollectionHow to Standardize Organization-Wide Data Collection
How to Standardize Organization-Wide Data CollectionQualtrics
 
AWS Summit Singapore - Building DXC's Digital Insurance as a Service (DIaaS) ...
AWS Summit Singapore - Building DXC's Digital Insurance as a Service (DIaaS) ...AWS Summit Singapore - Building DXC's Digital Insurance as a Service (DIaaS) ...
AWS Summit Singapore - Building DXC's Digital Insurance as a Service (DIaaS) ...Amazon Web Services
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
 
2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliantTrustArc
 

Ähnlich wie Data Privacy in the DMBOK - No Need to Reinvent the Wheel (20)

Privacy Advisory Service
Privacy Advisory ServicePrivacy Advisory Service
Privacy Advisory Service
 
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
 
Privacy Law and Compliance Forum 2016
Privacy Law and Compliance Forum 2016Privacy Law and Compliance Forum 2016
Privacy Law and Compliance Forum 2016
 
Sabre: Mastering a strong foundation for operational excellence and enhanced ...
Sabre: Mastering a strong foundation for operational excellence and enhanced ...Sabre: Mastering a strong foundation for operational excellence and enhanced ...
Sabre: Mastering a strong foundation for operational excellence and enhanced ...
 
Gde presentation introduction 3.6
Gde presentation introduction 3.6Gde presentation introduction 3.6
Gde presentation introduction 3.6
 
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]
 
GDPR and Data Quality - A Service Objects webinar
GDPR and Data Quality - A Service Objects webinarGDPR and Data Quality - A Service Objects webinar
GDPR and Data Quality - A Service Objects webinar
 
12123
1212312123
12123
 
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
 
Whos role is it anyway
Whos role is it anywayWhos role is it anyway
Whos role is it anyway
 
Festival of Marketing
Festival of MarketingFestival of Marketing
Festival of Marketing
 
Skylads - Big Data for Telcos
Skylads - Big Data for TelcosSkylads - Big Data for Telcos
Skylads - Big Data for Telcos
 
Key Considerations for Outsourcing Data Collection Services
Key Considerations for Outsourcing Data Collection ServicesKey Considerations for Outsourcing Data Collection Services
Key Considerations for Outsourcing Data Collection Services
 
The journey to trusted data and better decisions
The journey to trusted data and better decisionsThe journey to trusted data and better decisions
The journey to trusted data and better decisions
 
( Big ) Data Management - Governance - Global concepts in 5 slides
( Big ) Data Management - Governance - Global concepts in 5 slides( Big ) Data Management - Governance - Global concepts in 5 slides
( Big ) Data Management - Governance - Global concepts in 5 slides
 
How to Standardize Organization-Wide Data Collection
How to Standardize Organization-Wide Data CollectionHow to Standardize Organization-Wide Data Collection
How to Standardize Organization-Wide Data Collection
 
AWS Summit Singapore - Building DXC's Digital Insurance as a Service (DIaaS) ...
AWS Summit Singapore - Building DXC's Digital Insurance as a Service (DIaaS) ...AWS Summit Singapore - Building DXC's Digital Insurance as a Service (DIaaS) ...
AWS Summit Singapore - Building DXC's Digital Insurance as a Service (DIaaS) ...
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Why data governance is the new buzz?
Why data governance is the new buzz?Why data governance is the new buzz?
Why data governance is the new buzz?
 
2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant
 

Mehr von DATAVERSITY

Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...DATAVERSITY
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceDATAVERSITY
 
Exploring Levels of Data Literacy
Exploring Levels of Data LiteracyExploring Levels of Data Literacy
Exploring Levels of Data LiteracyDATAVERSITY
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsDATAVERSITY
 
Make Data Work for You
Make Data Work for YouMake Data Work for You
Make Data Work for YouDATAVERSITY
 
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?DATAVERSITY
 
Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?DATAVERSITY
 
Data Modeling Fundamentals
Data Modeling FundamentalsData Modeling Fundamentals
Data Modeling FundamentalsDATAVERSITY
 
Showing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectShowing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectDATAVERSITY
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at ScaleDATAVERSITY
 
Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?DATAVERSITY
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...DATAVERSITY
 
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?DATAVERSITY
 
Data Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsData Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsDATAVERSITY
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayDATAVERSITY
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise AnalyticsDATAVERSITY
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best PracticesDATAVERSITY
 
Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?DATAVERSITY
 
Data Management Best Practices
Data Management Best PracticesData Management Best Practices
Data Management Best PracticesDATAVERSITY
 
MLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageMLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageDATAVERSITY
 

Mehr von DATAVERSITY (20)

Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and Governance
 
Exploring Levels of Data Literacy
Exploring Levels of Data LiteracyExploring Levels of Data Literacy
Exploring Levels of Data Literacy
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business Goals
 
Make Data Work for You
Make Data Work for YouMake Data Work for You
Make Data Work for You
 
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?
 
Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?
 
Data Modeling Fundamentals
Data Modeling FundamentalsData Modeling Fundamentals
Data Modeling Fundamentals
 
Showing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectShowing ROI for Your Analytic Project
Showing ROI for Your Analytic Project
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at Scale
 
Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
 
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?
 
Data Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsData Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and Forwards
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement Today
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best Practices
 
Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?
 
Data Management Best Practices
Data Management Best PracticesData Management Best Practices
Data Management Best Practices
 
MLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageMLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive Advantage
 

Kürzlich hochgeladen

(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 

Kürzlich hochgeladen (20)

(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 

Data Privacy in the DMBOK - No Need to Reinvent the Wheel

  • 1. Castlebridge Associates Castlebridge Associates | Invent Centre | DCU | Glasnevin | Dublin 9| Ireland Changing How People in Organisations Think about Information DATA PRIVACY & THE DMBOK NO NEED TO REINVENT THE WHEEL!
  • 2. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential WHATWE ARE GOING TO COVER Why Data Privacy is Important Data Privacy in the DMBOK Some Other Concepts Ethical Information Management
  • 3. Castlebridge Associates © 2014 | Castlebridge Associates | Confidential WHY DATA PRIVACY IS IMPORTANT SOME KEYTRENDSTO BE AWARE OF…
  • 4. Castlebridge Associates © 2014 | Castlebridge Associates | Confidential People have entrusted us with their most personal information. We owe them nothing less than the best protections that we can possibly provide by harnessing the technology at our disposal. We must get this right. History has shown us that sacrificing our right to privacy can have dire consequences. Tim Cook, CEO Apple
  • 5. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential THE GLOBAL LEGISLATIVE TREND 7 17 36 68 111 0 20 40 60 80 100 120 1970s 1980s 1990s 2000s 2010-2015 Total Global Data Privacy Laws Total Global Data Privacy Law Within this, there is also continued evolution of existing Data Privacy laws (e.g. EU Data Protection Regulation)
  • 6. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential ONE KEY TREND… Global momentum toward the EU’s model of data privacy regulation has led to new laws and better protection for the consumer. Many non-EU countries have passed laws over the past 12 months that bring the world’s collective standards around data privacy closer to the high-water mark laid out by the EU’s overarching Privacy Directive. For instance, countries such as Malaysia and South Africa have recently passed new data privacy frameworks that closely follow the EU’s lead. South Africa has even gone one step farther and implemented provisions that will likely be implemented by the future EU Privacy Directive updates. - Forrester,August 2014
  • 7. © 2015 | Castlebridge Associates | Confidential A FRAMEWORK FORTHINKING ABOUT INFORMATION Strategic Business Information Technology TacticalOperationsCustomer Business Strategy & Governance Information Strategy & Governance IT Strategy & Governance Business Architecture & Planning Information Architecture & Planning Technology Architecture & Planning Management & Execution of Business Processes Management & Application of Information Management & Exploitation of IT Services Process Outcome Information Outcome Expectation Based on Amsterdam 9-box model by Prof. Rik Maes et al Privacy is Here
  • 8. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential A SUMMARY MAPPING OF CORE PRINCIPLES EU Principle OECD Principle(s) AICPA FIPP Obtain Data Fairly Openness Notice ; Choice and Consent Process for a Specified and Lawful Purpose Purpose Specification Collection Do not Process for an incompatible purpose Use Limitation Use, Retention, Disposal Ensure Data is Accurate, Complete,and Up-to-date Data Quality Quality Personal Data should be kept Safe and Secure Security Safeguards Security for Privacy; Disclosure Data must be adequate,relevant, not excessive Data Quailty Quality Personal data must not be kept for longer than necessary for the specified purposes Use, Retention, Disposal Individuals have rights of access, rectification,erasure, blocking Individual participation Access Management; Monitoring & Enforcement Penalties & Civil liability & Enforcement Accountability Monitoring & Enforcement
  • 9. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential One Stop Shop KEY PROVISIONS OF THE DATA PROTECTION REGULATION Core 8 Principles + Accountability Principle + Transparency Principle + Article 7, 8 ECHR Increased Penalties Moves towards a “Risk Based” model Explicit Focus on Governance Principles Driven Principles Driven Enhanced Rights: Data Portability; RTBF; Risk & Penalty Mitigation Documentation Risk & Penalty Mitigation Fines as % of Global Turnover General Data Protection Regulation – 1 Slide Summary
  • 10. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential WHY DOES IT MATTER?
  • 11. Castlebridge Associates © 2014 | Castlebridge Associates | Confidential DATA PRIVACY IN THE DMBOK
  • 12. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential DATA PRIVACY IN THE DMBOK WHEEL © DAMA International, used with permission
  • 13. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential DATA PRIVACY IN THE DMBOK WHEEL Remember to Respect Copyright
  • 14. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential DATA PRIVACY IN THE DMBOK WHEEL © DAMA International, used with permission
  • 15. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential DATA PROTECTIONTHROUGH THE DG/IQ LENS Current EU Data Protection Directive 95/46/EC
  • 16. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential DATA PROTECTION: PRINCIPLES Principle Governance Quality Personal data which is being processed must be fairly obtained and processed X Personal Data shall be obtained for a Specified and Lawful Purpose X Personal Data shall not be processed in a manner incompatible with the specified purpose X Personal Data shall be kept accurate and complete and, where necessary, kept up to date X Personal Data should be kept Safe & Secure X Data processed must be adequate, relevant and not excessive X X Personal data should not be kept for longer than necessary for the specified purpose or purposes X X Data Subjects have a right of Access. X
  • 17. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential DATA PROTECTION: QUALITY PRINCIPLES Principle Governance Quality Personal data which is being processed must be fairly obtained and processed X Personal Data shall be obtained for a Specified and Lawful Purpose X Personal Data shall not be processed in a manner incompatible with the specified purpose X Personal Data shall be kept accurate and complete and, where necessary, kept up to date X Personal Data should be kept Safe & Secure X Data processed must be adequate, relevant and not excessive X X Personal data should not be kept for longer than necessary for the specified purpose or purposes X X Data Subjects have a right of Access. X
  • 18. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential WHAT IS DATA QUALITY IN DMBOK? Definition: Planning, implementation, and control activities that apply quality management techniques to measure, assess, improve, and ensure the fitness of data for use. . Goals: • To measurably improve the quality of data in relation to defined business expectations. • To define requirements and specifications for integrating data quality control into the system development lifecycle. • To provide defined processes for measuring, monitoring, and reporting conformance to acceptable levels of data quality. Activities: 1. Develop and Promote Data Quality Awareness 2. Define Data Quality Requirements 3. Profile, Analyze, and Assess Data Quality 4. Define Data Quality Metrics 5. Define Data Quality Business Rules 6. Test and Validate Data Quality Requirements 7. Set and Evaluate Data Quality Service Levels 8. Continuously Measure and Monitor Data Quality 9. Manage Data Quality Issues 10. Clean and Correct Data Quality Defects 11. Design and Implement Operational DQM Procedures 12. Monitor Operational DQM Procedures and Performance Inputs Outputs Inputs: • Business Requirements • Data Requirements • Data Quality Expectations • Data Policies and Standards • Business Metadata • Technical Metadata • Data Sources and Data Stores Primary Deliverables: • Improved Quality Data • Data Management • Operational Analysis • Data Profiles • Data Quality Certification Reports • Data Quality Service Level • Agreements Metrics: • Data Value Statistics • Errors / Requirement Violations • Conformance to Expectations • Conformance to Service Levels Tools: • Data Profiling Tools • Statistical Analysis Tools • Data Cleansing Tools • Data Integration Tools • Issue and Event Management Tools
  • 19. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential EXAMPLE: MARKETING CONSENTS EXPIRE AFTER 12 MONTHS 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 12 months or over 10 -12 Months 6-9 months 3-6 months 0-3 months Marketing Months since last contact ePrivacy Directive ConsentTracker 30% x Avg uplift of €10 per campaign, 10% success rate, 1.2 million customers
  • 20. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential DATA PRIVACY IN THE DMBOK WHEEL © DAMA International, used with permission
  • 21. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential DATA PROTECTION: DATA DEVELOPMENT Principle Governance Quality Personal data which is being processed must be fairly obtained and processed X Personal Data shall be obtained for a Specified and Lawful Purpose X Personal Data shall not be processed in a manner incompatible with the specified purpose X Personal Data shall be kept accurate and complete and, where necessary, kept up to date X Personal Data should be kept Safe & Secure X Data processed must be adequate, relevant and not excessive X X Personal data should not be kept for longer than necessary for the specified purpose or purposes X X Data Subjects have a right of Access. X
  • 22. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential WHAT IS DATA DEVELOPMENT IN DMBOK? Definition: Designing, implementing, and maintaining solutions to meet the data needs of the enterprise. . Goals: • Identify and define data requirements. • Design data structures and other solutions to these requirements. • Implement and maintain solution components that meet these requirements. • Ensure solution conformance to data architecture and standards as appropriate. • Ensure the integrity, security, usability, and maintainability of structured data assets. Activities: 1. Data Modelling, Analysis and Solution Design • Analyze Information Requirements • Develop and Maintain Conceptual Data Models • Develop and Maintain Logical Data Models • Develop and Maintain Physical Data Models 2. Detailed Data Design • Design Physical Databases • Design Information Products • Design Data Access Services • Design Data Integration Services 3. Data Model and Design Quality Management • Develop Data Modeling and Design Standards • Review Data Model and Database Design Quality • Manage Data Model Versioning and Integration 4. Data Implementation • Build and test Data Access Services • Validate Information Requirements Inputs Outputs Inputs: • Business Goals and Strategies • Data Needs and Strategies • Data Standards • Data Architecture • Process Architecture • Application Architecture • Technical Architecture Primary Deliverables: • Data Requirements and Business Rules • Conceptual Data Models • Logical Data Models and Specifications • Physical Data Models and Specifications • Meta-data (Business and Technical) • Data Access Services
  • 23. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential HOW DATA DEVELOPMENT AFFECTS PRIVACY Obtain Storage Store/Share Apply
  • 24. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential HOW DATA DEVELOPMENT AFFECTS PRIVACY - EXAMPLE • EU e-marketing rules require explicit Opt-in consent for calls to mobiles and for SMS marketing • Fixed line is Opt-out • Data Modelling decision required here…
  • 25. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential HOW DATA DEVELOPMENT AFFECTS PRIVACY - EXAMPLE Marketing Other Call SMS Call Opt-in Is this a nominated contact for that purpose? Purposes Service Delivery Record opt-in for service delivery calls Opt-in Is this a nominated contact for that purpose? Record opt-in for service delivery calls Opt Out Record opt-in for service delivery calls Is this a nominated contact for that purpose? Email Opt-in Record opt-in for service delivery calls Is this a nominated contact for that purpose? Postal Opt-Out Record opt-in for service delivery calls Is this a nominated contact for that purpose?
  • 26. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential HOW DATA DEVELOPMENT AFFECTS PRIVACY – A KISS OF DEATHTO USEABLE DATA… Please tick this box if you would like us to not contact you Blanket Opt-Outs applied at the PARTY Entity level, not at the contact point or in the context of a specific purpose….
  • 27. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential WHAT CAN WE LEARN FROM DATA MODEL ABOUT PRIVACY IMPACTS?
  • 28. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential DATA PRIVACY IN THE DMBOK WHEEL © DAMA International, used with permission
  • 29. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential WHAT IS DATA ARCHITECTURE IN DMBOK? Definition: Defining the data needs of the enterprise and designing the master blueprints to meet those needs.. Goals: • To plan with vision and foresight to provide high quality data. • To identify and define common data requirements. • To design conceptual structures and plans to meet the current and long-term data requirements of the enterprise. Activities: 1. Understand Enterprise Information Needs 2. Develop and Maintain the Enterprise Data Model 3. Analyze and AlignWith Other Business Models 4. Define and Maintain the DataTechnology Architecture 5. Define and Maintain the Data Integration Architecture 6. Define and Maintain the DW/BI Architecture 7. Define and Maintain EnterpriseTaxonomies and Namespaces 8. Define and Maintain the Meta-data Architecture Inputs Outputs Inputs: • Business Goals • Business Strategies • Business Architecture • Process Architecture • IT Objectives • IT Strategies • Data Strategies • Data Issues • Data Needs • Technical Architecture Primary Deliverables: • Enterprise Data Model • Information Value Chain Analysis • Data Technology Architecture • Data Integration / MDM Architecture • DW / BI Architecture • Meta-data Architecture • Enterprise Taxonomies and Namespaces • Document Management Architecture • Metadata
  • 30. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential DATA PROTECTION: DATA ARCHITECTURE Principle Governance Quality Personal data which is being processed must be fairly obtained and processed X Personal Data shall be obtained for a Specified and Lawful Purpose X Personal Data shall not be processed in a manner incompatible with the specified purpose X Personal Data shall be kept accurate and complete and, where necessary, kept up to date X Personal Data should be kept Safe & Secure X Data processed must be adequate, relevant and not excessive X X Personal data should not be kept for longer than necessary for the specified purpose or purposes X X Data Subjects have a right of Access. X
  • 31. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential
  • 32. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential THE ZACHMAN FRAMEWORK Executive Business Manager Architect Engineer Technician How (Action) Why (Motivation) Where (Location) When (Event) Who (Actor) What (Data) Enterprise Scope Context Business Concepts System Logic Technology Physics Tool components Enterprise Inventory Identification Inventory Definition Inventory Representation Inventory Specification Inventory Configuration Inventory Instantiation Process Identification Process Definition Process Representation Process Specification Process Configuration Process Instantiations Distribution Identification Distribution Definition Distribution Representation Distribution Specification Distribution Configuration Distribution Instantiations Responsibility Identification Responsibility Definition Responsibility Representation Responsibility Specification Responsibility Configuration Distribution Instantiations Timing Identification Timing Definition Timing Representation Timing Specification Timing Configuration Timing Instantiations Motivation Identification Motivation Definition Motivation Representation Motivation Specification Motivation Configuration Motivation Instantiations Inventory Sets Process flows Distribution Networks Responsibility Assignments Timing Cycles Motivation Intentions Based on the Zachman Framework and content from Dennedy & Finneran’s Privacy Engineers Manifesto
  • 33. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential THE ZACHMAN FRAMEWORK Executive Business Manager Architect Engineer Technician How (Action) Why (Motivation) Where (Location) When (Event) Who (Actor) What (Data) Enterprise Scope Context Business Concepts System Logic Technology Physics Tool components Enterprise Inventory Identification Inventory Definition Inventory Representation Inventory Specification Inventory Configuration Inventory Instantiation Process Identification Process Definition Process Representation Process Specification Process Configuration Process Instantiations Distribution Identification Distribution Definition Distribution Representation Distribution Specification Distribution Configuration Distribution Instantiations Responsibility Identification Responsibility Definition Responsibility Representation Responsibility Specification Responsibility Configuration Distribution Instantiations Timing Identification Timing Definition Timing Representation Timing Specification Timing Configuration Timing Instantiations Motivation Identification Motivation Definition Motivation Representation Motivation Specification Motivation Configuration Motivation Instantiations Inventory Sets Process flows Distribution Networks Responsibility Assignments Timing Cycles Motivation Intentions What triggers need for data? Timing Identification Motivation Identification • Why? • Balancing priorities/goals • Purpose spec Specified data, specified purpose Specified data, specified purpose Based on the Zachman Framework and content from Dennedy & Finneran’s Privacy Engineers Manifesto
  • 34. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential THE ZACHMAN FRAMEWORK Executive Business Manager Architect Engineer Technician How (Action) Why (Motivation) Where (Location) When (Event) Who (Actor) What (Data) Enterprise Scope Context Business Concepts System Logic Technology Physics Tool components Enterprise Inventory Identification Inventory Definition Inventory Representation Inventory Specification Inventory Configuration Inventory Instantiation Process Identification Process Definition Process Representation Process Specification Process Configuration Process Instantiations Distribution Identification Distribution Definition Distribution Representation Distribution Specification Distribution Configuration Distribution Instantiations Responsibility Identification Responsibility Definition Responsibility Representation Responsibility Specification Responsibility Configuration Distribution Instantiations Timing Identification Timing Definition Timing Representation Timing Specification Timing Configuration Timing Instantiations Motivation Identification Motivation Definition Motivation Representation Motivation Specification Motivation Configuration Motivation Instantiations Inventory Sets Process flows Distribution Networks Responsibility Assignments Timing Cycles Motivation Intentions Data Classification IN CONTEXT How does the purpose get executed? Based on the Zachman Framework and content from Dennedy & Finneran’s Privacy Engineers Manifesto
  • 35. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential THE ZACHMAN FRAMEWORK Executive Business Manager Architect Engineer Technician How (Action) Why (Motivation) Where (Location) When (Event) Who (Actor) What (Data) Enterprise Scope Context Business Concepts System Logic Technology Physics Tool components Enterprise Inventory Identification Inventory Definition Inventory Representation Inventory Specification Inventory Configuration Inventory Instantiation Process Identification Process Definition Process Representation Process Specification Process Configuration Process Instantiations Distribution Identification Distribution Definition Distribution Representation Distribution Specification Distribution Configuration Distribution Instantiations Responsibility Identification Responsibility Definition Responsibility Representation Responsibility Specification Responsibility Configuration Distribution Instantiations Timing Identification Timing Definition Timing Representation Timing Specification Timing Configuration Timing Instantiations Motivation Identification Motivation Definition Motivation Representation Motivation Specification Motivation Configuration Motivation Instantiations Inventory Sets Process flows Distribution Networks Responsibility Assignments Timing Cycles Motivation Intentions Logical Schema Process Maps / Data Flow RACI Matrix Based on the Zachman Framework and content from Dennedy & Finneran’s Privacy Engineers Manifesto
  • 36. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential THE ZACHMAN FRAMEWORK Executive Business Manager Architect Engineer Technician How (Action) Why (Motivation) Where (Location) When (Event) Who (Actor) What (Data) Enterprise Scope Context Business Concepts System Logic Technology Physics Tool components Enterprise Inventory Identification Inventory Definition Inventory Representation Inventory Specification Inventory Configuration Invntory Instantiation Process Identification Process Definition Process Representation Process Specification Process Configuration Process Instantiations Distribution Identification Distribution Definition Distribution Representation Distribution Specification Distribution Configuration Distribution Instantiations Responsibility Identification Responsibility Definition Responsibility Representation Responsibility Specification Responsibility Configuration Distribution Instantiations Timing Identification Timing Definition Timing Representation Timing Specification Timing Configuration Timing Instantiations Motivation Identification Motivation Definition Motivation Representation Motivation Specification Motivation Configuration Motivation Instantiations Inventory Sets Process flows Distribution Networks Responsibility Assignments Timing Cycles Motivation Intentions Where is your data stored? What rules apply to that storage? Based on the Zachman Framework and content from Dennedy & Finneran’s Privacy Engineers Manifesto
  • 37. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential DATA PRIVACY IN THE DMBOK WHEEL © DAMA International, used with permission
  • 38. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential DATA PROTECTION: DATA GOVERNANCE Principle Governance Quality Personal data which is being processed must be fairly obtained and processed X Personal Data shall be obtained for a Specified and Lawful Purpose X Personal Data shall not be processed in a manner incompatible with the specified purpose X Personal Data shall be kept accurate and complete and, where necessary, kept up to date X Personal Data should be kept Safe & Secure X Data processed must be adequate, relevant and not excessive X X Personal data should not be kept for longer than necessary for the specified purpose or purposes X X Data Subjects have a right of Access. X
  • 39. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential WHAT IS DATA GOVERNANCE IN DMBOK? Definition: The exercise of authority and control (planning, monitoring, and enforcement) over the management of data assets.. Goals: • To define, approve, and communicate data strategies, policies, standards, architecture, procedures, and metrics. • To track and enforce regulatory compliance and conformance to data policies, standards, architecture, and procedures. • To sponsor, track, and oversee the delivery of data management projects and services. • To manage and resolve data related issues. • To understand and promote the value of data assets.. Activities: 1. Data Management Planning • Understand Strategic Enterprise Data Needs • Develop and Maintain the Data Strategy • Establish Data Professional Roles and Organizations • Identify and Appoint Data Stewards • Establish Data Governance and Stewardship Organizations • Develop and Approve Data Policies, Standards, and Procedures • Review and Approve Data Architecture • Plan and Sponsor Data Management Projects and Services • Estimate Data Asset Value and Associated Costs 2. Data Management Control • Supervise Data Professional Organizations and Staff • Coordinate Data Governance Activities • Manage and Resolve Data Related Issues • Monitor and Ensure Regulatory Compliance • Monitor and Enforce Conformance With Data Policies, Standards, • and Architecture • Oversee Data Management Projects and Services • Communicate and Promote the Value of Data Assets Inputs Outputs Inputs: • Business Goals • Business Strategies • IT Objectives • IT Strategies • Data Needs • Data Issues • Regulatory Requirements Primary Deliverables: • Data Policies • Data Standards • Resolved Issues • Data Management Projects and Services • Quality Data and Information • Recognized Data Value
  • 40. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential SOME KEY GOVERNANCE FUNCTIONS FROM PRIVACY PERSPECTIVE  Co-ordination of Data Privacy policies and standards  ISO29100 is a good core starting point  Ensuring staff are trained  Acting as “honest broker”  Ensuring appropriate risk posture in relation to privacy compliance  Ensuring processes for personal data are documented  Ensuring key controls are defined, operate, and are validated
  • 41. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential STEWARDSHIP FOR DATA PRIVACY Strategic Operational Tactical Doers Definers Deciders Co-ordinators           3DC Stewardship Defined not by WHERE they are in organisation, but by ROLE in relation to Information
  • 42. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential A DATA STEWARDSHIP MIND MAP Governance & Stewardship Data Use Steward (Doer/Definer) UX Requirements Privacy Reporting Screens & Reports Quality Screen & Reports Content Design & Aesthetics Data Governance Reqts (Co-ordinator) Data Standards Compliance Use of Metadata Documentation Metric Driven Quality Assurance Data Management Structure Data Collection Steward (Doer/Definer) Data Classification (PII, Sensitive) Encryption Business Content Rules Privacy Rules Privacy Reqts Steward (Decider/Definer) Purpose Notice Consent Transfer (3rd Party) Access/Correction/Deletion Proportionality Retention Responsible Action Based on work by M. Dennedy & Tom Finneran
  • 43. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential THE DATA PROTECTION OFFICER ROLE • On the Executive Board? • Reporting to Executive Board? • Must be Independent • Technical and Business skills • Accountable for the System of Governance • “StatutoryTenure”
  • 44. Castlebridge Associates © 2014 | Castlebridge Associates | Confidential SOME FINAL CONCEPTS
  • 45. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential PRIVACY BY DESIGN What is it? Privacy by Design is a philosophy for systems engineering which takes privacy into account throughout the whole engineering process. Why is it Important? Privacy by Design establishes 7 guiding principles for development of systems that respect and enhance privacy as a quality system What is it? It is just QUALITY MANAGEMENT applied to Information, with PRIVACY as a “critical to quality” characteristic
  • 46. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential PRIVACY BY DESIGN 'You cannot inspect quality into a product.' The quality is there or it isn't by the time it's inspected.
  • 47. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential PRIVACY BY DESIGN Focus on defining processes & rules, not correcting errors Privacy as a quality characteristic A function of process design, not an after thought Things need to work without undue invasion of privacy Information Asset Life Cycle thinking Communicate, Document, communicate more! Focus on the Customer – Customer determines Quality /Privacy
  • 48. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential PRIVACY ENGINEERING What is it? Privacy Engineering is the discipline that ensures the gathering and application of privacy requirements has the same primacy as other ‘functional’ requirements in processes and systems and incorporates them into the project, product, system, or information life cycle. Why is it Important? It is the glue that makes PBD operative in an organisation What is it? It is just QUALITY ENGINEERING applied to Information, with PRIVACY as a “critical to quality” characteristic
  • 49. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential ELEMENTS OF PRIVACY ENGINEERING MAPPED TO JURAN Enterprise Goals User Goals Privacy Policy Requirements Policies and Procedures Privacy Mechanisms Privacy Awareness Training Quality Assurance QA Feedback Improvement
  • 50. Castlebridge Associates © 2014 | Castlebridge Associates | Confidential ETHICAL INFORMATION MANAGEMENT THE NEW EIM
  • 51. Castlebridge Associates © 2015 | Castlebridge Associates | Confidential Business Information Technology Society’s Ethical Framework Organisation’s Ethical Framework Regulation & Laws Lobbying StrategicTacticalOperationsCustomer Standards & Codes Standard Practices Business Strategy & Governance Information Strategy & Governance IT Strategy & Governance Business Architecture & Planning Information Architecture & Planning Technology Architecture & Planning Management & Execution of Business Processes Management & Application of Information Management & Exploitation of IT Services Process Outcome Information Outcome Customer Feedback Customer Education Expectation Business Information Technology