SlideShare ist ein Scribd-Unternehmen logo
1 von 51
Downloaden Sie, um offline zu lesen


Methods	and	Tools	for	GDPR	Compliance	through	
Privacy	and	Data	
Protection	4	Engineering


Methods	and	tools	for


privacy	and	data	protection	


assurance
Tecnalia,	UPM
10/03/2020
2
Outline
➢Privacy	and	data	protection	assurance


❑	Problem	and	context


➢Proposed	method


❑	GDPR	modelling


❑	Assurance	cases


❑	Evidence	accountability


➢Tool	support	for	the	method


❑	Eclipse	OpenCert
10/03/2020 2
3
10/03/2020 3
GDPR


Article	5


Principles	
relating	to	
processing	of	
personal	data
4
Methods	and	Tools	for	Assurance
A	method	to	support	the	systematic	capture,	
traceability	and	argumentation	of	evidence	so	as	
to	demonstrate	compliance	with	GDPR	(and	
comply	with	the	principle	of	accountability),	and	
a	tool	to	guide	and	partially	automate	that	
method
10/03/2020 4
5
Assurance	-	Definition
10/03/2020 5
Assurance grounds for confidence that the other four security
goals (integrity, availability, confidentiality, and accountability)
have been adequately met by a specific implementation.
“Adequately met” includes:
1
Functionality that performs correctly,
2
Sufficient protection against unintentional errors (by users or software),
and
3
Sufficient resistance to intentional penetration or by-pass.
[NIST Special Publication 800-27 Rev A]
6
Problem	and	context
➢GDPR	became	mandatory	in	May	2018,	but	the	legal	approach	is	not	enough,	we	
need	to	come	along	with	technical	measures.


❑How	is	GDPR	translated	into	operational	work	items	and	activities	for	the	development	
project?


❑Do	we	have	a	method	for	systematic	capture	of	evidences	and	their	association	with	GDPR	
derived	requirements	and	artefacts?


❑How	can	we	track	evidence	evolution?


❑Do	we	have	a	method	to	provide	a	clear	argumentation	about	compliance?
10/03/2020 6
7
Context
10/03/2020 7
(Independent )
Safety	Assessment
Safety
Assessment
Certification
Liaison
Privacy


Assessment
(Independent)


Privacy	Assessment
7
Context
10/03/2020 7
Product	Engineering
“Project”
Quality
Management
Implementation
Validation	&
Verification
Design
(Independent )
Safety	Assessment
Safety
Assessment
Certification
Liaison
Privacy


Assessment
(Independent)


Privacy	Assessment
7
Context
10/03/2020 7
Product	Engineering
“Project”
Quality
Management
Implementation
Validation	&
Verification
Design
(Independent )
Safety	Assessment
Safety
Assessment
Certification
Liaison
Privacy


Assessment
(Independent)


Privacy	Assessment
Standards	&	Regulations
Information	Management
Interpretation
Standards
Specification
7
Context
10/03/2020 7
Supplier	Chain
Component
Release
Module	Assurance
Case	Development
Product	Engineering
“Project”
Quality
Management
Implementation
Validation	&
Verification
Design
(Independent )
Safety	Assessment
Safety
Assessment
Certification
Liaison
Privacy


Assessment
(Independent)


Privacy	Assessment
Standards	&	Regulations
Information	Management
Interpretation
Standards
Specification
7
Context
10/03/2020 7
Supplier	Chain
Component
Release
Module	Assurance
Case	Development
Product	Engineering
“Project”
Quality
Management
Implementation
Validation	&
Verification
Design
(Independent )
Safety	Assessment
Safety
Assessment
Certification
Liaison
Privacy


Assessment
(Independent)


Privacy	Assessment
Assurance
“Project”
Assurance	Case
Development
Evidence
Management Assurance	Process
Management
Compliance
Management
Standards	&	Regulations
Information	Management
Interpretation
Standards
Specification
8
➢This	is	Alex.	She	is	a	system	
engineer	who	works	as	the	
technical	lead	in	a	company


➢She	is	NOT	a	lawyer	and	she	finds	
GDPR	hard	to	interpret


➢She	has	identified	3	privacy	related	
standards:


❑ GDPR


❑ 27001


❑ NIST


➢What	has	PDP4E	to	offer	for	her	
work?
8
10/03/2020
9
Modelling	standards
➢Modelling	standards	provides:


❑An	unambiguous	way	to	show	the	explicit	process	for	standards	compliance


❑A	systematic	way	for	the	different	roles	to	share	the	same	view	on	standards	compliance


❑Mappings	between	concepts	and	terminology	between	standards


❑Models	to	capture	the	context	in	which	concepts	apply	in	the	standards


❑A	way	to	see	where	things	match,	and	also	identify	gaps


➢Main	challenges	behind


❑GDPR	is	not	a	technical	standard	developed	by	engineers	but	by	lawyers


❑There	is	not	an	explicit	process	behind


❑Standards	ecosystems


▪ Legal	à GDPR


▪ Good	practices	à 27001


▪ Implementation	standards	à NIST
10/03/2020 9
10
Assurance	method	concepts
➢Prescriptive	Knowledge	Management	is	the	assurance	area	
concerned	with	the	specification	and	handling	of	standards’	
and	normative	information,	as	well	as	any	other	information	
derived	from	or	based	on	them	(interpretations,	tailoring,	
mapping	between	standards,	etc.)	This	is	done	by	means	of	
reference	assurance	frameworks.
10/03/2020 10
11
Assurance	method	concepts
➢Equivalence	mappings
10/03/2020 11
RefFramework


Model	


(e.g.	GDPR)
Icon Element
Activity
Role
Artefact
Input	(Artefact	to	Activity)	
Output	(Activity	to	Artefact)
Participation	(Role	to	Activity)
Precedence	(Activity	to	Activity)
N/A	(box	
within	box)
Containment	(Activity	to	Activity)
RefFramework


Model	


(e.g.	27001)
Equivalence


Map	Model
RefFramework


Model	


(e.g.	NIST)
Equivalence


Map	Model
Regulation	Modelling Equivalences	Modelling
11
Assurance	method	concepts
➢Equivalence	mappings
10/03/2020 11
RefFramework


Model	


(e.g.	GDPR)
Icon Element
Activity
Role
Artefact
Input	(Artefact	to	Activity)	
Output	(Activity	to	Artefact)
Participation	(Role	to	Activity)
Precedence	(Activity	to	Activity)
N/A	(box	
within	box)
Containment	(Activity	to	Activity)
RefFramework


Model	


(e.g.	27001)
Equivalence


Map	Model
RefFramework


Model	


(e.g.	NIST)
Equivalence


Map	Model
Regulation	Modelling Equivalences	Modelling
➢Model	Instantiation	for	a	specific	project
11
Assurance	method	concepts
➢Equivalence	mappings
10/03/2020 11
RefFramework


Model	


(e.g.	GDPR)
Icon Element
Activity
Role
Artefact
Input	(Artefact	to	Activity)	
Output	(Activity	to	Artefact)
Participation	(Role	to	Activity)
Precedence	(Activity	to	Activity)
N/A	(box	
within	box)
Containment	(Activity	to	Activity)
RefFramework


Model	


(e.g.	27001)
Equivalence


Map	Model
RefFramework


Model	


(e.g.	NIST)
Equivalence


Map	Model
Baseline


Model	


(e.g.	Smart	Grid)
Baseline


Model	


(e.g.	Connected


vehicle)
Assurance	Project	(e.g.	Smart	Grids	or	Connected	vehicle)
Regulation	Modelling Equivalences	Modelling
➢Model	Instantiation	for	a	specific	project
11
Assurance	method	concepts
➢Equivalence	mappings
10/03/2020 11
RefFramework


Model	


(e.g.	GDPR)
Icon Element
Activity
Role
Artefact
Input	(Artefact	to	Activity)	
Output	(Activity	to	Artefact)
Participation	(Role	to	Activity)
Precedence	(Activity	to	Activity)
N/A	(box	
within	box)
Containment	(Activity	to	Activity)
RefFramework


Model	


(e.g.	27001)
Equivalence


Map	Model
RefFramework


Model	


(e.g.	NIST)
Equivalence


Map	Model
Baseline


Model	


(e.g.	Smart	Grid)
Baseline


Model	


(e.g.	Connected


vehicle)
Assurance	Project	(e.g.	Smart	Grids	or	Connected	vehicle)
Tailoring


(RefFramework	subset)
Regulation	Modelling Equivalences	Modelling
➢Model	Instantiation	for	a	specific	project
11
Assurance	method	concepts
➢Equivalence	mappings
10/03/2020 11
RefFramework


Model	


(e.g.	GDPR)
Icon Element
Activity
Role
Artefact
Input	(Artefact	to	Activity)	
Output	(Activity	to	Artefact)
Participation	(Role	to	Activity)
Precedence	(Activity	to	Activity)
N/A	(box	
within	box)
Containment	(Activity	to	Activity)
RefFramework


Model	


(e.g.	27001)
Equivalence


Map	Model
RefFramework


Model	


(e.g.	NIST)
Equivalence


Map	Model
Baseline


Model	


(e.g.	Smart	Grid)
Baseline


Model	


(e.g.	Connected


vehicle)
Assurance	Project	(e.g.	Smart	Grids	or	Connected	vehicle)
Tailoring


(RefFramework	subset)
Tailoring


(RefFramework	subset)
Regulation	Modelling Equivalences	Modelling
➢Model	Instantiation	for	a	specific	project
12
10/03/2020 12
➢Alex	is	part	of	a	team


➢How	can	they	provide	justification	for	compliance?


➢How	can	they	trace	the	evidences	with	the	supporting	requirements	and	the	
proposed	treatments	to	solve	privacy	concerns?


➢Is	there	a	way	to	reproduce	and	systematize	good	practices	for	compliance	
and	the	rationale	behind?
13
Assurance	cases	approach
➢Assurance	cases	were	originally	used	to	show	that	systems	satisfied	their	safety-
critical	properties.	In	this	usage,	they	were	(and	are)	called	safety	cases.
10/03/2020 13
13
Assurance	cases	approach
➢Assurance	cases	were	originally	used	to	show	that	systems	satisfied	their	safety-
critical	properties.	In	this	usage,	they	were	(and	are)	called	safety	cases.
An	assurance	case	consists	of	documented	body	of	evidence	that	
provides	a	convincing	and	valid	argument	that	a	specified	set	of	critical	
claims	regarding	a	system´s	properties	are	adequately	justified	for	a	
given	application	in	a	given	environment.	
10/03/2020 13
13
Assurance	cases	approach
➢Assurance	cases	were	originally	used	to	show	that	systems	satisfied	their	safety-
critical	properties.	In	this	usage,	they	were	(and	are)	called	safety	cases.
An	assurance	case	consists	of	documented	body	of	evidence	that	
provides	a	convincing	and	valid	argument	that	a	specified	set	of	critical	
claims	regarding	a	system´s	properties	are	adequately	justified	for	a	
given	application	in	a	given	environment.	
➢Main	problems:


- It	is	easy	to	present	long	reports	referencing	evidences	but	with	no	real	connection	on	how	those	
evidences	relates	with	the	safety	requirements	à lack	of	clarity


- Some	times	the	reports	offers	argumentation	without	evidences	that	support	it		à unconvincing


- It	is	hard	to	inform	third	parties	the	rationale	behind	some	developments
10/03/2020 13
13
Assurance	cases	approach
➢Assurance	cases	were	originally	used	to	show	that	systems	satisfied	their	safety-
critical	properties.	In	this	usage,	they	were	(and	are)	called	safety	cases.
An	assurance	case	consists	of	documented	body	of	evidence	that	
provides	a	convincing	and	valid	argument	that	a	specified	set	of	critical	
claims	regarding	a	system´s	properties	are	adequately	justified	for	a	
given	application	in	a	given	environment.	
Assurance	cases	put	in	relation


evidences	and	objectives
➢Main	problems:


- It	is	easy	to	present	long	reports	referencing	evidences	but	with	no	real	connection	on	how	those	
evidences	relates	with	the	safety	requirements	à lack	of	clarity


- Some	times	the	reports	offers	argumentation	without	evidences	that	support	it		à unconvincing


- It	is	hard	to	inform	third	parties	the	rationale	behind	some	developments
10/03/2020 13
14
Privacy	argument	fragment
➢Within	the	limits	defined	in	[scope]	the	application	[system	description]	is	
privacy	ensured	because	all	identified	threats	[system	threats]	and	requirements	
[privacy	requirements]	have	been	addressed.	Threats	have	been	sufficiently		
controlled	and	mitigated	[Risk	reduction	measures]	according	to	the	privacy	risk	
exposure	[Risk	assessment].	Evidence	[Privacy	analysis/test]	is	provided	that	
demonstrated	the	effectiveness	and	sufficiency	of	these	measures.	Appropriate	
roles,	responsibilities	and	methods	were	defined	throughout	the	development	of	
this	system	[Development	process	justification]	[Privacy	management	system]	
and	defined	future	operation	
10/03/2020 14
14
Privacy	argument	fragment
➢Within	the	limits	defined	in	[scope]	the	application	[system	description]	is	
privacy	ensured	because	all	identified	threats	[system	threats]	and	requirements	
[privacy	requirements]	have	been	addressed.	Threats	have	been	sufficiently		
controlled	and	mitigated	[Risk	reduction	measures]	according	to	the	privacy	risk	
exposure	[Risk	assessment].	Evidence	[Privacy	analysis/test]	is	provided	that	
demonstrated	the	effectiveness	and	sufficiency	of	these	measures.	Appropriate	
roles,	responsibilities	and	methods	were	defined	throughout	the	development	of	
this	system	[Development	process	justification]	[Privacy	management	system]	
and	defined	future	operation	
10/03/2020 14
15
Argument decomposition
10/03/2020 15
Context Goal
Strategy
Solution
Justification
J
Assumption
A
Solved	by
In	the	context	of
Graphical	notation	GSN
16
10/03/2020 16
16
10/03/2020 16
Security	Requirements	&	Objectives
16
10/03/2020 16
Security	Requirements	&	Objectives
Security	Evidence
16
10/03/2020 16
Security	Requirements	&	Objectives
Security	Evidence
Security	Argument
17
Evidence	model	and	compliance	models
➢Information	required	to	characterize	evidence	artefacts


❑Who	produced	it


❑Revision	and	configuration	management


❑“Trustworthiness”


➢Links	to	:


❑Engineering	process	results,


❑Standard	objectives/requirements,


❑And	to	argument	claims	
10/03/2020 17
18
Evidence	management
Determine	the	
evidence	to	
provide
Collect	
evidence	item	
information
Specify	traceability	
between		
evidence	items
Evaluate	evidence	
item
Is	the	
evidence	
adequate? Yes
No
Address	issues
10/03/2020 18
19
Assurance	management	concepts
➢Assurance	Project	Management,	determines	the	baseline	elements	of	an	
assurance	project	from	reference	assurance	frameworks


➢Evidence	Management	whose	information	is	mapped	to	baseline	elements	
for	specifying	compliance	with	a	reference	assurance	framework	(information	
to	collect)


➢Argumentation	Management,	which	can	refer	to	compliance	with	a	reference	
assurance	framework	(compliance	argument)
10/03/2020 19
20
Evidence	model
➢Information	or	objective	artefacts	being	offered	in	support	of	one	or	more	claims	
[SACM]


➢Overall,	there	are	two	types	of	privacy	evidence


❑Compliance(process)-based	evidence	vs.	product-based	evidence


➢Traceability	(and	dependency)	exists	between	pieces	of	evidence


➢Artefacts	can	be	defined	at	several	granularity	levels


❑Reqs.	specification	document	vs.	single	requirement
Artefact Evidence Claim
used	as supports
10/03/2020 20
21
Concepts	for	accountability
Evidences


Model	
Compliance


Map	Model
Argumentation	


model
Baseline


Model	


(e.g.	SmartGrid)
Assurance	Project	(e.g.	Smart	Grids	or	Connected	vehicle)
What	is	plan	to	Do What	has	Been	Done
Compliance	maps	are	the	responsable	for	tracing	
standard	derived	artefacts
10/03/2020 21
22
Tool	support	for	the	method
10/03/2020 22
https://www.eclipse.org/opencert/
23
Assurance	
Project	
Definition
Assurance	Case	
Management
Evidence	
Management
Compliance	
Management
Reporting
Regulation	Modelling Equivalences	Modelling
Assurance	methodology
10/03/2020 23
24
Tool	support	for	the	method
Evidence


Management
Prescriptive


Knowledge


Management
Privacy


Argumentation


Management
Assurance Project


Lifecycle


Management
Project


Repository
Measurement


&


Transparency
Assurance Configuration


Management
System Management
Standards &


Understandings
Argument


Patterns
Risk	Control


Product


Engineering


Tools	


Requirements,


Models
Link
Connect
10/03/2020 24
24
Tool	support	for	the	method
Evidence


Management
Prescriptive


Knowledge


Management
Privacy


Argumentation


Management
Assurance Project


Lifecycle


Management
Project


Repository
Measurement


&


Transparency
Assurance Configuration


Management
System Management
Standards &


Understandings
Argument


Patterns
Risk	Control


Product


Engineering


Tools	


Requirements,


Models
Link
Connect
10/03/2020 24
24
Tool	support	for	the	method
Evidence


Management
Prescriptive


Knowledge


Management
Privacy


Argumentation


Management
Assurance Project


Lifecycle


Management
Project


Repository
Measurement


&


Transparency
Assurance Configuration


Management
System Management
Standards &


Understandings
Argument


Patterns
Risk	Control


Product


Engineering


Tools	


Requirements,


Models
Link
Connect
10/03/2020 24
24
Tool	support	for	the	method
Evidence


Management
Prescriptive


Knowledge


Management
Privacy


Argumentation


Management
Assurance Project


Lifecycle


Management
Project


Repository
Measurement


&


Transparency
Assurance Configuration


Management
System Management
Standards &


Understandings
Argument


Patterns
Risk	Control


Product


Engineering


Tools	


Requirements,


Models
Link
Connect
10/03/2020 24
24
Tool	support	for	the	method
Evidence


Management
Prescriptive


Knowledge


Management
Privacy


Argumentation


Management
Assurance Project


Lifecycle


Management
Project


Repository
Measurement


&


Transparency
Assurance Configuration


Management
System Management
Standards &


Understandings
Argument


Patterns
Risk	Control


Product


Engineering


Tools	


Requirements,


Models
Link
Connect
10/03/2020 24
24
Tool	support	for	the	method
Evidence


Management
Prescriptive


Knowledge


Management
Privacy


Argumentation


Management
Assurance Project


Lifecycle


Management
Project


Repository
Measurement


&


Transparency
Assurance Configuration


Management
System Management
Standards &


Understandings
Argument


Patterns
Risk	Control


Product


Engineering


Tools	


Requirements,


Models
Link
Connect
10/03/2020 24
25
10/03/2020 25
26
10/03/2020 26
27
10/03/2020 27
28
10/03/2020 28
29
10/03/2020 29
30
10/03/2020 30


Methods	and	Tools	for	GDPR	Compliance	through	
Privacy	and	Data	
Protection	4	Engineering


Reference	frameworks


Explicit	evidences


Explicit	and	clear	argumentation


Explicit	traceability	to	reference	
frameworks


Jabier	Martinez	(Tecnalia)


jabier.martinez@tecnalia.com

Weitere ähnliche Inhalte

Was ist angesagt?

H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overviewElsa Prieto
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protectionUlf Mattsson
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaUlf Mattsson
 
N-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 daysN-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 daysSolarwinds N-able
 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016Elsa Prieto
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloudUlf Mattsson
 
Data Virtualization for Accelerated Digital Transformation in Banking and Fin...
Data Virtualization for Accelerated Digital Transformation in Banking and Fin...Data Virtualization for Accelerated Digital Transformation in Banking and Fin...
Data Virtualization for Accelerated Digital Transformation in Banking and Fin...Denodo
 
Future data security ‘will come from several sources’
Future data security ‘will come from several sources’Future data security ‘will come from several sources’
Future data security ‘will come from several sources’John Davis
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationUlf Mattsson
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Ulf Mattsson
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...Ulf Mattsson
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyUlf Mattsson
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020Ulf Mattsson
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloudUlf Mattsson
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...Sebastien Deleersnyder
 
Migration approachquestionnaire checklist
Migration approachquestionnaire checklistMigration approachquestionnaire checklist
Migration approachquestionnaire checklistNandeep Nagarkar
 

Was ist angesagt? (20)

H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
 
Book
BookBook
Book
 
ETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco securityETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco security
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protection
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
N-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 daysN-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 days
 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 
Data Virtualization for Accelerated Digital Transformation in Banking and Fin...
Data Virtualization for Accelerated Digital Transformation in Banking and Fin...Data Virtualization for Accelerated Digital Transformation in Banking and Fin...
Data Virtualization for Accelerated Digital Transformation in Banking and Fin...
 
Future data security ‘will come from several sources’
Future data security ‘will come from several sources’Future data security ‘will come from several sources’
Future data security ‘will come from several sources’
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computation
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
 
Migration approachquestionnaire checklist
Migration approachquestionnaire checklistMigration approachquestionnaire checklist
Migration approachquestionnaire checklist
 

Ähnlich wie Wp6 workshop 10_march2020

DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018DEFeND Project
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSInteraktiv
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project DEFeND Project
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationEryk Budi Pratama
 
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec GroupEXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec GroupFeroot
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR ComplianceGabor Farkas
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING IJNSA Journal
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELINGDESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELINGIJNSA Journal
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS cscpconf
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachIRJET Journal
 
Is Encryption the Only Key to GDPR?
Is Encryption the Only Key to GDPR?Is Encryption the Only Key to GDPR?
Is Encryption the Only Key to GDPR?Joe Orlando
 
GDPR: Protecting Your Data
GDPR: Protecting Your DataGDPR: Protecting Your Data
GDPR: Protecting Your DataUlf Mattsson
 
MRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational MeasuresMRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational MeasuresMRS
 

Ähnlich wie Wp6 workshop 10_march2020 (20)

Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
Privacy by Design: legal perspective
Privacy by Design: legal perspectivePrivacy by Design: legal perspective
Privacy by Design: legal perspective
 
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec GroupEXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec Group
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELINGDESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
 
Privacy Data Protection for Engineers - PDP4E
Privacy Data Protection for Engineers - PDP4EPrivacy Data Protection for Engineers - PDP4E
Privacy Data Protection for Engineers - PDP4E
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
 
Is Encryption the Only Key to GDPR?
Is Encryption the Only Key to GDPR?Is Encryption the Only Key to GDPR?
Is Encryption the Only Key to GDPR?
 
GDPR: Protecting Your Data
GDPR: Protecting Your DataGDPR: Protecting Your Data
GDPR: Protecting Your Data
 
MRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational MeasuresMRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational Measures
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 

Mehr von Privacy Data Protection for Engineering (11)

Paris wp5 pd-pb_d
Paris wp5 pd-pb_dParis wp5 pd-pb_d
Paris wp5 pd-pb_d
 
Beawre pitch
Beawre pitchBeawre pitch
Beawre pitch
 
Pdp4e IPEN-2019
Pdp4e  IPEN-2019Pdp4e  IPEN-2019
Pdp4e IPEN-2019
 
Long term security evolution of ai and data protection antonio kung trialog...
Long term security evolution of ai and data protection   antonio kung trialog...Long term security evolution of ai and data protection   antonio kung trialog...
Long term security evolution of ai and data protection antonio kung trialog...
 
Granular or holistic approaches - Antonio Kung
Granular or holistic approaches - Antonio KungGranular or holistic approaches - Antonio Kung
Granular or holistic approaches - Antonio Kung
 
Granular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra RuizGranular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra Ruiz
 
Antonio kung impact of ai on privacy sept 10
Antonio kung impact of ai on privacy   sept 10Antonio kung impact of ai on privacy   sept 10
Antonio kung impact of ai on privacy sept 10
 
Antonio kung - pdp4e privacy engineering oxford sept 9 - v2
Antonio kung - pdp4e privacy engineering oxford   sept 9 - v2Antonio kung - pdp4e privacy engineering oxford   sept 9 - v2
Antonio kung - pdp4e privacy engineering oxford sept 9 - v2
 
Pdp4 e privacy engineering toolkit ipen 2019
Pdp4 e privacy engineering toolkit   ipen 2019Pdp4 e privacy engineering toolkit   ipen 2019
Pdp4 e privacy engineering toolkit ipen 2019
 
Ipen 2019 roma status of privacy engineering standardisation v2
Ipen 2019 roma   status of privacy engineering standardisation v2Ipen 2019 roma   status of privacy engineering standardisation v2
Ipen 2019 roma status of privacy engineering standardisation v2
 
Ipen2018
Ipen2018Ipen2018
Ipen2018
 

Kürzlich hochgeladen

Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 

Kürzlich hochgeladen (20)

Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 

Wp6 workshop 10_march2020