SlideShare una empresa de Scribd logo
1 de 9
@aureliepols
Data Science Protected
The Rule of Law is the basis for Democracy
US & UK EU APEC
Common Law Continental Law Continental
law influenced
Class actions Fines
(by DPAs: Data Protection Agencies)
Privacy Personal Data Protection
Business focused Citizen focused: data belongs to the
visitor/prospect/consumer/citizen
Patchwork of sector based
legislations: HIPPA,
COPPA, VPPA, …
Over-arching EU Directives &
Regulations
PII: varies per state Risk levels: low, medium, high,
extremely high
@aureliepols
Data Science Protected
PII list of variables & US states 2
Medical information as PII
California
Arkansas
Missouri
New Hampshire
North Dakota
Texas
Virginia
Financial information as PII
Alaska North Carolina
Iowa North Dakota
Kansas Oregon
Massachusetts South Carolina
Missouri Vermont
Nevada Wisconsin
New York* Wyoming
Passwords as PII
Georgia
Maine
Nebraska
Biometric information as PII
Iowa
Nebraska
North Carolina
Wisconsin
Source: information based on
current ongoing analysis (partial
@aureliepols
Data Science Protected
PII vs. Risk levels, US vs. EU
Low
Medium
(profiling)
High
(sensitive)
Risk
level
Data type
Information Security Measures
Extremely high
(profiling of sensitive data)
PII
@aureliepols
Data Science Protected
Total Privacy fines, penalties & settlements worldwide
Just 6 weeks into 2014, the world total in Privacy damages has
already reached half the level of last year’s record: $74 million
Source:
http://www.computerworld.com/s/article/9246393/Jay_Cli
ne_U.S._takes_the_gold_in_doling_out_privacy_fines?ta
@aureliepols
Data Science Protected
EU Fines?
Spain: responsible for 80% of data protection fines in the EU
Source: http://i0.kym-
cdn.com/photos/images/newsfeed/00
0/242/381/63a.jpg
Source:
http://www.mindyourprivacy.com/downlo
ad/privacy-infographic.pdf
@aureliepols
Data Science Protected
Techno security is just 1 piece of the puzzle
Data Collection
Processes
Resources
@aureliepols
Data Science Protected
MYP Information Security Framework
Organizational Data Security measures
CONFIDENTIALITY
SECURITY PRIVACY
Integrity Availability Authentication
DATA LIFECYCLE
RISK CLASSIFICATION
Low/medium/high/extreme
@aureliepols
Data Science Protected
Remember! Human error causes most data breaches
Source:
http://www.cooldailyinfographic
s.com/post/data-and-security-
breaches
@aureliepols
Data Science Protected
www.privacyisthenewgreen.com

Más contenido relacionado

Destacado

Taylor rita
Taylor ritaTaylor rita
Taylor ritaRita_E
 
Bertamasya ke banda
Bertamasya ke bandaBertamasya ke banda
Bertamasya ke bandaArya Ningrat
 
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...FLUZO
 
มอสซี่ บัสเตอร์
มอสซี่ บัสเตอร์มอสซี่ บัสเตอร์
มอสซี่ บัสเตอร์Neannapa Khajornmot
 
Kisah katak kecil
Kisah katak kecilKisah katak kecil
Kisah katak kecilhamdEy
 
Privacy & Analytics: Yeti or Snow Fairy?
Privacy & Analytics: Yeti or Snow Fairy?Privacy & Analytics: Yeti or Snow Fairy?
Privacy & Analytics: Yeti or Snow Fairy?FLUZO
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessCisco Security
 
Paola Voci, «In support of lightness: mobile phones and transient cultures »
Paola Voci, «In support of lightness: mobile phones and transient cultures »Paola Voci, «In support of lightness: mobile phones and transient cultures »
Paola Voci, «In support of lightness: mobile phones and transient cultures »MobileCreation
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 

Destacado (16)

Taylor rita
Taylor ritaTaylor rita
Taylor rita
 
Bertamasya ke banda
Bertamasya ke bandaBertamasya ke banda
Bertamasya ke banda
 
Rizkan
RizkanRizkan
Rizkan
 
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
 
มอสซี่ บัสเตอร์
มอสซี่ บัสเตอร์มอสซี่ บัสเตอร์
มอสซี่ บัสเตอร์
 
Intannnnn5555
Intannnnn5555Intannnnn5555
Intannnnn5555
 
Kisah katak kecil
Kisah katak kecilKisah katak kecil
Kisah katak kecil
 
Privacy & Analytics: Yeti or Snow Fairy?
Privacy & Analytics: Yeti or Snow Fairy?Privacy & Analytics: Yeti or Snow Fairy?
Privacy & Analytics: Yeti or Snow Fairy?
 
Catalog of prime-industrial-components
Catalog of prime-industrial-componentsCatalog of prime-industrial-components
Catalog of prime-industrial-components
 
Bab 1 nifas 2
Bab 1 nifas 2Bab 1 nifas 2
Bab 1 nifas 2
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 
affizan eady
affizan eadyaffizan eady
affizan eady
 
Paola Voci, «In support of lightness: mobile phones and transient cultures »
Paola Voci, «In support of lightness: mobile phones and transient cultures »Paola Voci, «In support of lightness: mobile phones and transient cultures »
Paola Voci, «In support of lightness: mobile phones and transient cultures »
 
Catalog of prime-industrial-components
Catalog of prime-industrial-componentsCatalog of prime-industrial-components
Catalog of prime-industrial-components
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Fathers day
Fathers dayFathers day
Fathers day
 

Similar a E metrics san fran 2014 aurelie pols final

IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...FLUZO
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...FLUZO
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyFLUZO
 
Att. patrizia giannini ggi lisbon conference 19 april 2013 - electronic dis...
Att. patrizia giannini   ggi lisbon conference 19 april 2013 - electronic dis...Att. patrizia giannini   ggi lisbon conference 19 april 2013 - electronic dis...
Att. patrizia giannini ggi lisbon conference 19 april 2013 - electronic dis...Amministratore Bluefactor
 
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Steve Werby
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementKeelan Stewart
 
Att. patrizia giannini fordham university new york 19 july 2013 - electroni...
Att. patrizia giannini   fordham university new york 19 july 2013 - electroni...Att. patrizia giannini   fordham university new york 19 july 2013 - electroni...
Att. patrizia giannini fordham university new york 19 july 2013 - electroni...Amministratore Bluefactor
 
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsPrivacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsAnitafin
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Eric Vanderburg
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoTLAURA VIVET
 
Predicting Violent Behavior The Psychology of Risk Assessment.docx
Predicting Violent Behavior The Psychology of Risk Assessment.docxPredicting Violent Behavior The Psychology of Risk Assessment.docx
Predicting Violent Behavior The Psychology of Risk Assessment.docxharrisonhoward80223
 
Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014Thermo Fisher Scientific
 
Online Child Enticement
Online Child EnticementOnline Child Enticement
Online Child EnticementCrystalLK
 
Safety of protected health information (phi)
Safety of protected health information (phi)Safety of protected health information (phi)
Safety of protected health information (phi)Josette Pribilla
 
Hildebrandt baker robbins presentation for coo roundtable 2010 by dave cunn...
Hildebrandt baker robbins presentation for coo roundtable 2010   by dave cunn...Hildebrandt baker robbins presentation for coo roundtable 2010   by dave cunn...
Hildebrandt baker robbins presentation for coo roundtable 2010 by dave cunn...David Cunningham
 
Protecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to KnowProtecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to KnowNetwork 1 Consulting
 
Social Media, Healthcare and the Law
Social Media, Healthcare and the LawSocial Media, Healthcare and the Law
Social Media, Healthcare and the LawBrian Ahier
 

Similar a E metrics san fran 2014 aurelie pols final (20)

IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
 
Att. patrizia giannini ggi lisbon conference 19 april 2013 - electronic dis...
Att. patrizia giannini   ggi lisbon conference 19 april 2013 - electronic dis...Att. patrizia giannini   ggi lisbon conference 19 april 2013 - electronic dis...
Att. patrizia giannini ggi lisbon conference 19 april 2013 - electronic dis...
 
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
 
Att. patrizia giannini fordham university new york 19 july 2013 - electroni...
Att. patrizia giannini   fordham university new york 19 july 2013 - electroni...Att. patrizia giannini   fordham university new york 19 july 2013 - electroni...
Att. patrizia giannini fordham university new york 19 july 2013 - electroni...
 
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsPrivacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
 
Predicting Violent Behavior The Psychology of Risk Assessment.docx
Predicting Violent Behavior The Psychology of Risk Assessment.docxPredicting Violent Behavior The Psychology of Risk Assessment.docx
Predicting Violent Behavior The Psychology of Risk Assessment.docx
 
Brainstorming exercise
Brainstorming exerciseBrainstorming exercise
Brainstorming exercise
 
Brainstorming exercise
Brainstorming exerciseBrainstorming exercise
Brainstorming exercise
 
Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014Legislative Update: State and Federal Developments. July 9, 2014
Legislative Update: State and Federal Developments. July 9, 2014
 
Online Child Enticement
Online Child EnticementOnline Child Enticement
Online Child Enticement
 
Data Breach: It Can Happen To You
Data Breach: It Can Happen To YouData Breach: It Can Happen To You
Data Breach: It Can Happen To You
 
Safety of protected health information (phi)
Safety of protected health information (phi)Safety of protected health information (phi)
Safety of protected health information (phi)
 
Hildebrandt baker robbins presentation for coo roundtable 2010 by dave cunn...
Hildebrandt baker robbins presentation for coo roundtable 2010   by dave cunn...Hildebrandt baker robbins presentation for coo roundtable 2010   by dave cunn...
Hildebrandt baker robbins presentation for coo roundtable 2010 by dave cunn...
 
Protecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to KnowProtecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to Know
 
Social Media, Healthcare and the Law
Social Media, Healthcare and the LawSocial Media, Healthcare and the Law
Social Media, Healthcare and the Law
 

Más de FLUZO

Guia Social Media de Tercera Generación. El fin del experimento, el inicio de...
Guia Social Media de Tercera Generación. El fin del experimento, el inicio de...Guia Social Media de Tercera Generación. El fin del experimento, el inicio de...
Guia Social Media de Tercera Generación. El fin del experimento, el inicio de...FLUZO
 
Customers in the cloud pulse final
Customers in the cloud   pulse finalCustomers in the cloud   pulse final
Customers in the cloud pulse finalFLUZO
 
Monetize your digital channel to prioritize potential opportunities
Monetize your digital channel to prioritize potential opportunitiesMonetize your digital channel to prioritize potential opportunities
Monetize your digital channel to prioritize potential opportunitiesFLUZO
 
Social Media o Social Data: ¿qué contribuye más a tu negocio?
Social Media o Social Data: ¿qué contribuye más a tu negocio?	Social Media o Social Data: ¿qué contribuye más a tu negocio?
Social Media o Social Data: ¿qué contribuye más a tu negocio? FLUZO
 
Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...
Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...
Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...FLUZO
 
Guía de Privacidad en el Móvil
Guía de Privacidad en el MóvilGuía de Privacidad en el Móvil
Guía de Privacidad en el MóvilFLUZO
 
Analítica web y Privacidad (eShow Madrid 2013)
Analítica web y Privacidad (eShow Madrid 2013)Analítica web y Privacidad (eShow Madrid 2013)
Analítica web y Privacidad (eShow Madrid 2013)FLUZO
 
Diseño web: del concepto al resultado. Ricardo Tayar en SEonthebeach 2013
Diseño web: del concepto al resultado. Ricardo Tayar en SEonthebeach 2013Diseño web: del concepto al resultado. Ricardo Tayar en SEonthebeach 2013
Diseño web: del concepto al resultado. Ricardo Tayar en SEonthebeach 2013FLUZO
 
Presentación de Gemma Muñoz en Chile Digital 2013
Presentación de Gemma Muñoz en Chile Digital 2013Presentación de Gemma Muñoz en Chile Digital 2013
Presentación de Gemma Muñoz en Chile Digital 2013FLUZO
 
La nueva ley de cookies (Conversion Thursday Zaragoza)
La nueva ley de cookies (Conversion Thursday Zaragoza)La nueva ley de cookies (Conversion Thursday Zaragoza)
La nueva ley de cookies (Conversion Thursday Zaragoza)FLUZO
 
Análisis de Fuentes de Tráfico en Analítica Web (Practitioner Web Analytics m...
Análisis de Fuentes de Tráfico en Analítica Web (Practitioner Web Analytics m...Análisis de Fuentes de Tráfico en Analítica Web (Practitioner Web Analytics m...
Análisis de Fuentes de Tráfico en Analítica Web (Practitioner Web Analytics m...FLUZO
 
Privacy in Europe eMetrics Summit London2012
Privacy in Europe eMetrics Summit London2012Privacy in Europe eMetrics Summit London2012
Privacy in Europe eMetrics Summit London2012FLUZO
 
Myg taller monetización - rené dechamps
Myg   taller monetización - rené dechampsMyg   taller monetización - rené dechamps
Myg taller monetización - rené dechampsFLUZO
 

Más de FLUZO (13)

Guia Social Media de Tercera Generación. El fin del experimento, el inicio de...
Guia Social Media de Tercera Generación. El fin del experimento, el inicio de...Guia Social Media de Tercera Generación. El fin del experimento, el inicio de...
Guia Social Media de Tercera Generación. El fin del experimento, el inicio de...
 
Customers in the cloud pulse final
Customers in the cloud   pulse finalCustomers in the cloud   pulse final
Customers in the cloud pulse final
 
Monetize your digital channel to prioritize potential opportunities
Monetize your digital channel to prioritize potential opportunitiesMonetize your digital channel to prioritize potential opportunities
Monetize your digital channel to prioritize potential opportunities
 
Social Media o Social Data: ¿qué contribuye más a tu negocio?
Social Media o Social Data: ¿qué contribuye más a tu negocio?	Social Media o Social Data: ¿qué contribuye más a tu negocio?
Social Media o Social Data: ¿qué contribuye más a tu negocio?
 
Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...
Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...
Aurélie Pols en Strata Conference: Digital analytics & privacy - it’s not the...
 
Guía de Privacidad en el Móvil
Guía de Privacidad en el MóvilGuía de Privacidad en el Móvil
Guía de Privacidad en el Móvil
 
Analítica web y Privacidad (eShow Madrid 2013)
Analítica web y Privacidad (eShow Madrid 2013)Analítica web y Privacidad (eShow Madrid 2013)
Analítica web y Privacidad (eShow Madrid 2013)
 
Diseño web: del concepto al resultado. Ricardo Tayar en SEonthebeach 2013
Diseño web: del concepto al resultado. Ricardo Tayar en SEonthebeach 2013Diseño web: del concepto al resultado. Ricardo Tayar en SEonthebeach 2013
Diseño web: del concepto al resultado. Ricardo Tayar en SEonthebeach 2013
 
Presentación de Gemma Muñoz en Chile Digital 2013
Presentación de Gemma Muñoz en Chile Digital 2013Presentación de Gemma Muñoz en Chile Digital 2013
Presentación de Gemma Muñoz en Chile Digital 2013
 
La nueva ley de cookies (Conversion Thursday Zaragoza)
La nueva ley de cookies (Conversion Thursday Zaragoza)La nueva ley de cookies (Conversion Thursday Zaragoza)
La nueva ley de cookies (Conversion Thursday Zaragoza)
 
Análisis de Fuentes de Tráfico en Analítica Web (Practitioner Web Analytics m...
Análisis de Fuentes de Tráfico en Analítica Web (Practitioner Web Analytics m...Análisis de Fuentes de Tráfico en Analítica Web (Practitioner Web Analytics m...
Análisis de Fuentes de Tráfico en Analítica Web (Practitioner Web Analytics m...
 
Privacy in Europe eMetrics Summit London2012
Privacy in Europe eMetrics Summit London2012Privacy in Europe eMetrics Summit London2012
Privacy in Europe eMetrics Summit London2012
 
Myg taller monetización - rené dechamps
Myg   taller monetización - rené dechampsMyg   taller monetización - rené dechamps
Myg taller monetización - rené dechamps
 

E metrics san fran 2014 aurelie pols final

  • 1. @aureliepols Data Science Protected The Rule of Law is the basis for Democracy US & UK EU APEC Common Law Continental Law Continental law influenced Class actions Fines (by DPAs: Data Protection Agencies) Privacy Personal Data Protection Business focused Citizen focused: data belongs to the visitor/prospect/consumer/citizen Patchwork of sector based legislations: HIPPA, COPPA, VPPA, … Over-arching EU Directives & Regulations PII: varies per state Risk levels: low, medium, high, extremely high
  • 2. @aureliepols Data Science Protected PII list of variables & US states 2 Medical information as PII California Arkansas Missouri New Hampshire North Dakota Texas Virginia Financial information as PII Alaska North Carolina Iowa North Dakota Kansas Oregon Massachusetts South Carolina Missouri Vermont Nevada Wisconsin New York* Wyoming Passwords as PII Georgia Maine Nebraska Biometric information as PII Iowa Nebraska North Carolina Wisconsin Source: information based on current ongoing analysis (partial
  • 3. @aureliepols Data Science Protected PII vs. Risk levels, US vs. EU Low Medium (profiling) High (sensitive) Risk level Data type Information Security Measures Extremely high (profiling of sensitive data) PII
  • 4. @aureliepols Data Science Protected Total Privacy fines, penalties & settlements worldwide Just 6 weeks into 2014, the world total in Privacy damages has already reached half the level of last year’s record: $74 million Source: http://www.computerworld.com/s/article/9246393/Jay_Cli ne_U.S._takes_the_gold_in_doling_out_privacy_fines?ta
  • 5. @aureliepols Data Science Protected EU Fines? Spain: responsible for 80% of data protection fines in the EU Source: http://i0.kym- cdn.com/photos/images/newsfeed/00 0/242/381/63a.jpg Source: http://www.mindyourprivacy.com/downlo ad/privacy-infographic.pdf
  • 6. @aureliepols Data Science Protected Techno security is just 1 piece of the puzzle Data Collection Processes Resources
  • 7. @aureliepols Data Science Protected MYP Information Security Framework Organizational Data Security measures CONFIDENTIALITY SECURITY PRIVACY Integrity Availability Authentication DATA LIFECYCLE RISK CLASSIFICATION Low/medium/high/extreme
  • 8. @aureliepols Data Science Protected Remember! Human error causes most data breaches Source: http://www.cooldailyinfographic s.com/post/data-and-security- breaches