SlideShare ist ein Scribd-Unternehmen logo
1 von 6
1
Privacy
 Privacy is an abstract and contentious term
 It is often described as a basic right
 Privacy has several dimensions: (Richard Clarke)
 Privacy of the person; “bodily privacy”
 Privacy of personal behavior
 Privacy of personal communications
 Privacy of personal data
2
Information Privacy
 A combination of communications and data privacy
 Recognition of the impact computer and networking
technologies have had upon our individual privacy
 Affords us the control over:
 Acquisition of private information; access; collection
 Distribution or transfer of private information
 Use of private information; intended purpose
 Unwanted solicitation; “invasion of privacy”
 Storage
3
Privacy Laws, Rules and Guidelines
 Many privacy rules and laws can be traced back to the
foundational work of the OECD in 1980.
 Organization for Economic Cooperation and Development:
www.oecd.org
 Eight privacy principles were developed that were forward
looking and technology neutral.
TC 615
Fall 2007
4
OECD on Privacy
Collection
Limitation
Principle
There should be limits to the collection of personal data and any such
data should be obtained by lawful and fair means and, where
appropriate, with the knowledge or consent of the data subject.
Data Quality
Principle
Personal data should be relevant to the purposes for which they are to
be used, and, to the extent necessary for those purposes, should be
accurate, complete and kept up-to-date.
Purpose
Specification
Principle
The purposes for which personal data are collected should be
specified not later than at the time of data collection and the
subsequent use limited to the fulfillment of those purposes.
Use Limitation
Principle
Personal data should not be disclosed, made available or otherwise
used for purposes other than those specified in accordance with the
above, except with the consent of the data subject or by the authority
of law
5
TC 615
Fall 2007
OECD on Privacy
Security
Safeguards
Principle
Personal data should be protected by reasonable security safeguards
against such risks as loss or unauthorized access, destruction, use,
modification or disclosure of data.
Openness
Principle
There should be a general policy of openness about developments,
practices and policies with respect to personal data. Means should be
readily available of establishing the existence and nature of personal
data, and the main purposes of their use, as well as the identity and
usual residence of the data controller
6
TC 615
Fall 2007
OECD on Privacy
Individual
Participation
Principle
An individual should have the right:
a) to obtain from a data controller, or otherwise, confirmation of
whether or not the data controller has data relating to him;
b) to have communicated to him, data relating to him
within a reasonable time;
at a charge, if any, that is not excessive;
in a reasonable manner; and
in a form that is readily intelligible to him;
c) to be given reasons if a request made under subparagraphs(a) and
(b) is denied, and to be able to challenge such denial; and
d) to challenge data relating to him and, if the challenge is successful
to have the data erased, rectified, completed or amended.
Accountability
Principle
A data controller should be accountable for complying with measures
which give effect to the principles stated above

Weitere ähnliche Inhalte

Was ist angesagt?

Data protectionpolicyliec
Data protectionpolicyliecData protectionpolicyliec
Data protectionpolicyliec
vrishi31
 
Data protection-training
Data protection-trainingData protection-training
Data protection-training
James Wright
 

Was ist angesagt? (20)

Revision of Legal issues for Unit 11.pptx
Revision of Legal issues for Unit 11.pptxRevision of Legal issues for Unit 11.pptx
Revision of Legal issues for Unit 11.pptx
 
Securing your Data, Reporting Recommended Practices
Securing your Data, Reporting Recommended PracticesSecuring your Data, Reporting Recommended Practices
Securing your Data, Reporting Recommended Practices
 
The GDPR Armageddon – One year on
The GDPR Armageddon – One year onThe GDPR Armageddon – One year on
The GDPR Armageddon – One year on
 
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloudLasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
 
Preparing Research Data for Sharing
Preparing Research Data for SharingPreparing Research Data for Sharing
Preparing Research Data for Sharing
 
Data protectionpolicyliec
Data protectionpolicyliecData protectionpolicyliec
Data protectionpolicyliec
 
Privacy in Bigdata Era
Privacy in Bigdata  EraPrivacy in Bigdata  Era
Privacy in Bigdata Era
 
Data Privacy, Ethics and Protection. A Guidance Note on Big Data for Achievem...
Data Privacy, Ethics and Protection. A Guidance Note on Big Data for Achievem...Data Privacy, Ethics and Protection. A Guidance Note on Big Data for Achievem...
Data Privacy, Ethics and Protection. A Guidance Note on Big Data for Achievem...
 
Basic principles to information privacy in data mining & data warehouse
Basic principles to information privacy in data mining & data warehouseBasic principles to information privacy in data mining & data warehouse
Basic principles to information privacy in data mining & data warehouse
 
GDPR Data Lifecycle
GDPR Data LifecycleGDPR Data Lifecycle
GDPR Data Lifecycle
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
GDPR presentation
GDPR presentationGDPR presentation
GDPR presentation
 
GDPR Data Life Cycle
GDPR Data Life CycleGDPR Data Life Cycle
GDPR Data Life Cycle
 
The Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research communityThe Privacy Law Landscape: Issues for the research community
The Privacy Law Landscape: Issues for the research community
 
Why We Require GDPR?
Why We Require GDPR?Why We Require GDPR?
Why We Require GDPR?
 
Developing a privacy compliance program
Developing a privacy compliance programDeveloping a privacy compliance program
Developing a privacy compliance program
 
Secure channels inc. basic rules for data protection compliance
Secure channels inc.  basic rules for data protection complianceSecure channels inc.  basic rules for data protection compliance
Secure channels inc. basic rules for data protection compliance
 
What is CJIS Compliance?
What is CJIS Compliance?What is CJIS Compliance?
What is CJIS Compliance?
 
Data protection-training
Data protection-trainingData protection-training
Data protection-training
 
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral ResearchersAdjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
 

Andere mochten auch (6)

Information Security Discussion for GM667 Saint Mary's University of MN
Information Security Discussion for GM667 Saint Mary's University of MNInformation Security Discussion for GM667 Saint Mary's University of MN
Information Security Discussion for GM667 Saint Mary's University of MN
 
Computers
ComputersComputers
Computers
 
Information Security
Information SecurityInformation Security
Information Security
 
Information security principles an understanding
Information security principles an understandingInformation security principles an understanding
Information security principles an understanding
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Ähnlich wie Privacy Discusssion GM667 Saint Mary's University of MN

Privacy Ordinance in Hong Kong
Privacy Ordinance in Hong KongPrivacy Ordinance in Hong Kong
Privacy Ordinance in Hong Kong
若水 鲁
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
Ulf Mattsson
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .
ClinosolIndia
 
Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...
Werksmans Attorneys
 
Managing Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentationManaging Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentation
silvereyez11
 

Ähnlich wie Privacy Discusssion GM667 Saint Mary's University of MN (20)

Privacy Ordinance in Hong Kong
Privacy Ordinance in Hong KongPrivacy Ordinance in Hong Kong
Privacy Ordinance in Hong Kong
 
Overview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOPOverview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOP
 
Part 3 - Data Protection Principles.pdf
Part 3 - Data Protection Principles.pdfPart 3 - Data Protection Principles.pdf
Part 3 - Data Protection Principles.pdf
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .
 
Data privacy and consent management (K.sailaja).pptx
Data privacy and consent management (K.sailaja).pptxData privacy and consent management (K.sailaja).pptx
Data privacy and consent management (K.sailaja).pptx
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPR
 
General Data Protection Regulation or GDPR
General Data Protection Regulation or GDPRGeneral Data Protection Regulation or GDPR
General Data Protection Regulation or GDPR
 
pr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdfpr Privacy Principles 230405 small.pdf
pr Privacy Principles 230405 small.pdf
 
Hexagon presentation light.pptx
Hexagon presentation light.pptxHexagon presentation light.pptx
Hexagon presentation light.pptx
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...Saying "I Don't": the requirement of data subject consent for purposes of dat...
Saying "I Don't": the requirement of data subject consent for purposes of dat...
 
Esc gdpr oct 2018
Esc gdpr oct 2018Esc gdpr oct 2018
Esc gdpr oct 2018
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
 
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
 
Managing Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentationManaging Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentation
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2...
Reasonable Security Practices And Procedures And Sensitive Personala  24 06 2...Reasonable Security Practices And Procedures And Sensitive Personala  24 06 2...
Reasonable Security Practices And Procedures And Sensitive Personala 24 06 2...
 
Ichec & ESC gdpr feb 2020
Ichec & ESC gdpr feb 2020Ichec & ESC gdpr feb 2020
Ichec & ESC gdpr feb 2020
 

Mehr von Saint Mary's University of Minnesota

Mehr von Saint Mary's University of Minnesota (20)

Digital literacy, competence and citizenship
Digital literacy, competence and citizenshipDigital literacy, competence and citizenship
Digital literacy, competence and citizenship
 
Ed tech tools and categories
Ed tech tools and categoriesEd tech tools and categories
Ed tech tools and categories
 
Teaching fellows 2018
Teaching fellows 2018Teaching fellows 2018
Teaching fellows 2018
 
17 11 2 master p-pt
17 11 2 master p-pt17 11 2 master p-pt
17 11 2 master p-pt
 
Digital literacy short
Digital literacy shortDigital literacy short
Digital literacy short
 
Blackboard basics
Blackboard basicsBlackboard basics
Blackboard basics
 
Powerpoint tips
Powerpoint tipsPowerpoint tips
Powerpoint tips
 
Types of Instructional Technology
Types of Instructional TechnologyTypes of Instructional Technology
Types of Instructional Technology
 
Blackboard basics
Blackboard basicsBlackboard basics
Blackboard basics
 
Symposium eddeve
Symposium eddeveSymposium eddeve
Symposium eddeve
 
At risk high school students and high prestige
At risk high school students and high prestigeAt risk high school students and high prestige
At risk high school students and high prestige
 
Teaching fellows 2016
Teaching fellows 2016Teaching fellows 2016
Teaching fellows 2016
 
Gsoe presentation 100915
Gsoe presentation 100915Gsoe presentation 100915
Gsoe presentation 100915
 
Blackboard Basics for New Faculty Orientation 10/15
Blackboard Basics for New Faculty Orientation 10/15Blackboard Basics for New Faculty Orientation 10/15
Blackboard Basics for New Faculty Orientation 10/15
 
Blended redesign workshop 10 1-15
Blended redesign workshop 10 1-15Blended redesign workshop 10 1-15
Blended redesign workshop 10 1-15
 
Strategic Change Interventions Team D/Module 7
Strategic Change Interventions Team D/Module 7 Strategic Change Interventions Team D/Module 7
Strategic Change Interventions Team D/Module 7
 
E friday technology for online content learning
E friday technology for online content learningE friday technology for online content learning
E friday technology for online content learning
 
Bb Intro for EdD 818
Bb Intro for EdD 818Bb Intro for EdD 818
Bb Intro for EdD 818
 
Trial for blackboard
Trial for blackboardTrial for blackboard
Trial for blackboard
 
Blended Learning
Blended LearningBlended Learning
Blended Learning
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Privacy Discusssion GM667 Saint Mary's University of MN

  • 1. 1 Privacy  Privacy is an abstract and contentious term  It is often described as a basic right  Privacy has several dimensions: (Richard Clarke)  Privacy of the person; “bodily privacy”  Privacy of personal behavior  Privacy of personal communications  Privacy of personal data
  • 2. 2 Information Privacy  A combination of communications and data privacy  Recognition of the impact computer and networking technologies have had upon our individual privacy  Affords us the control over:  Acquisition of private information; access; collection  Distribution or transfer of private information  Use of private information; intended purpose  Unwanted solicitation; “invasion of privacy”  Storage
  • 3. 3 Privacy Laws, Rules and Guidelines  Many privacy rules and laws can be traced back to the foundational work of the OECD in 1980.  Organization for Economic Cooperation and Development: www.oecd.org  Eight privacy principles were developed that were forward looking and technology neutral. TC 615 Fall 2007
  • 4. 4 OECD on Privacy Collection Limitation Principle There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject. Data Quality Principle Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date. Purpose Specification Principle The purposes for which personal data are collected should be specified not later than at the time of data collection and the subsequent use limited to the fulfillment of those purposes. Use Limitation Principle Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with the above, except with the consent of the data subject or by the authority of law
  • 5. 5 TC 615 Fall 2007 OECD on Privacy Security Safeguards Principle Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorized access, destruction, use, modification or disclosure of data. Openness Principle There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity and usual residence of the data controller
  • 6. 6 TC 615 Fall 2007 OECD on Privacy Individual Participation Principle An individual should have the right: a) to obtain from a data controller, or otherwise, confirmation of whether or not the data controller has data relating to him; b) to have communicated to him, data relating to him within a reasonable time; at a charge, if any, that is not excessive; in a reasonable manner; and in a form that is readily intelligible to him; c) to be given reasons if a request made under subparagraphs(a) and (b) is denied, and to be able to challenge such denial; and d) to challenge data relating to him and, if the challenge is successful to have the data erased, rectified, completed or amended. Accountability Principle A data controller should be accountable for complying with measures which give effect to the principles stated above