SlideShare una empresa de Scribd logo
1 de 26
@johnchavens
• IEEE P7000: Model Process for Addressing Ethical Concerns During System Design
• IEEE P7001: Transparency of Autonomous Systems
• IEEE P7002: Data Privacy Process
• IEEE P7003: Algorithmic Bias Considerations
• IEEE P7004: Standard on Child and Student Data Governance
• IEEE P7005: Standard on Employer Data Governance
• IEEE P7006: Standard on Personal Data AI Agent Working Group
Modern consent is deceptive by design.
March, 2025
Your first born child
In using this service, you agree to relinquish your first
born child to F-Secure, as and when the company
requires it. In the event that no children are produced,
your most beloved pet will be taken instead. The terms
of this agreement stand for eternity.
Ann Cavoukian – Information & Privacy Commissioner Ontario, Canada
1. Proactive not Reactive; Preventive not Remedial: PbD anticipates and prevents Privacy-invasive events
before they happen
2. Privacy as the Default Setting: PbD seeks to deliver the maximum degree of Privacy by ensuring that
personal data are automatically protected in any given IT system or business practice
3. Privacy embedded into Design: It is not bolted on as an add-on, after the fact. It’s an essential
component of the core functionality being delivered
4. Full-functionality – Positive Sum not Zero Sum: no trade-offs, no false dichotomies
5. End to End Security – Full Lifetime Protection: cradle to grave lifecycle management of information, end-
to-end
6. Visibility and Transparency – Keep it Open: operating according to the stated promises and objectives,
subject to independent verification
7. Respect for User Privacy – Keep it User-Centric: strong Privacy defaults, appropriate notice, and
empowering user-friendly options
Privacy by Design (PbD)
7 Fundamental Principles
12 Responsibilities of a Data Controller
1. Inform participants
2. Obtain informed consent
3. Ensure the data held is accurate
4. Delete personal data when it is no longer needed => delete or anonymize
5. Protect against unauthorized destruction, loss, alteration and disclosure => security
6. Contract with Data Processors responsibly
7. Take care transferring data out of Europe
8. If you collect “special” categories of data, get specialist advice
9. Deal with any data subject access requests
10. If the assessment is high stakes, ensure there is review of any automated decision making
11. Appoint a Data Protection Officer (DPO) and train staff
12. Work with supervisory authorities and respond to complaints
Source: http://blog.questionmark.com/responsibilities-of-a-data-controller-when-assessing-knowledge-skills-and-abilities
johnchavens.com

Más contenido relacionado

La actualidad más candente

Conferencia principal: Evolución y visión de Elastic Security
Conferencia principal: Evolución y visión de Elastic SecurityConferencia principal: Evolución y visión de Elastic Security
Conferencia principal: Evolución y visión de Elastic SecurityElasticsearch
 
Discovery of rest at data
Discovery of rest at dataDiscovery of rest at data
Discovery of rest at dataSanjeev Solanki
 
WhyWorkWithDevGarden
WhyWorkWithDevGardenWhyWorkWithDevGarden
WhyWorkWithDevGardenAndrew Pagels
 
Seekintoo-SIEM Consulting
Seekintoo-SIEM ConsultingSeekintoo-SIEM Consulting
Seekintoo-SIEM ConsultingPaul Enright
 
Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Asim Jahan
 
How to neutralize vulnerabilities in a mixed cloud- on premise environment
How to neutralize vulnerabilities in a mixed cloud- on premise environmentHow to neutralize vulnerabilities in a mixed cloud- on premise environment
How to neutralize vulnerabilities in a mixed cloud- on premise environmentEstuate, Inc.
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudNetskope
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting ServicesePlus
 
IoTC - The Future of IoT Privacy & Security Task Force
IoTC - The Future of IoT Privacy & Security Task ForceIoTC - The Future of IoT Privacy & Security Task Force
IoTC - The Future of IoT Privacy & Security Task ForceChristopher P. Williams
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Discovery of rest at data
Discovery of rest at dataDiscovery of rest at data
Discovery of rest at dataSanjeev Solanki
 
Operationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelinesOperationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelinesElasticsearch
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeePlus
 
The Journey from Zero to SOC: How Citadel built its Security Operations from ...
The Journey from Zero to SOC: How Citadel built its Security Operations from ...The Journey from Zero to SOC: How Citadel built its Security Operations from ...
The Journey from Zero to SOC: How Citadel built its Security Operations from ...Elasticsearch
 
ITT - Tech CNS Captstone Project
ITT - Tech CNS Captstone ProjectITT - Tech CNS Captstone Project
ITT - Tech CNS Captstone Projectvegasgirl1
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsInterset
 
Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Introdchadwick
 
Implementing Best Practices.pptx
Implementing Best Practices.pptxImplementing Best Practices.pptx
Implementing Best Practices.pptxdamilolasunmola
 

La actualidad más candente (20)

Conferencia principal: Evolución y visión de Elastic Security
Conferencia principal: Evolución y visión de Elastic SecurityConferencia principal: Evolución y visión de Elastic Security
Conferencia principal: Evolución y visión de Elastic Security
 
Discovery of rest at data
Discovery of rest at dataDiscovery of rest at data
Discovery of rest at data
 
WhyWorkWithDevGarden
WhyWorkWithDevGardenWhyWorkWithDevGarden
WhyWorkWithDevGarden
 
Presentation
PresentationPresentation
Presentation
 
Seekintoo-SIEM Consulting
Seekintoo-SIEM ConsultingSeekintoo-SIEM Consulting
Seekintoo-SIEM Consulting
 
Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture
 
How to neutralize vulnerabilities in a mixed cloud- on premise environment
How to neutralize vulnerabilities in a mixed cloud- on premise environmentHow to neutralize vulnerabilities in a mixed cloud- on premise environment
How to neutralize vulnerabilities in a mixed cloud- on premise environment
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the Cloud
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting Services
 
IoTC - The Future of IoT Privacy & Security Task Force
IoTC - The Future of IoT Privacy & Security Task ForceIoTC - The Future of IoT Privacy & Security Task Force
IoTC - The Future of IoT Privacy & Security Task Force
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Discovery of rest at data
Discovery of rest at dataDiscovery of rest at data
Discovery of rest at data
 
Operationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelinesOperationalize with alerting, custom dashboards, and timelines
Operationalize with alerting, custom dashboards, and timelines
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security Landscape
 
The Journey from Zero to SOC: How Citadel built its Security Operations from ...
The Journey from Zero to SOC: How Citadel built its Security Operations from ...The Journey from Zero to SOC: How Citadel built its Security Operations from ...
The Journey from Zero to SOC: How Citadel built its Security Operations from ...
 
ITT - Tech CNS Captstone Project
ITT - Tech CNS Captstone ProjectITT - Tech CNS Captstone Project
ITT - Tech CNS Captstone Project
 
Thinkitsolution
ThinkitsolutionThinkitsolution
Thinkitsolution
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
 
Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Intro
 
Implementing Best Practices.pptx
Implementing Best Practices.pptxImplementing Best Practices.pptx
Implementing Best Practices.pptx
 

Similar a Applied data analytics_v1_6.23

Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White PapaerKristyn Greenwood
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Gridbradley_g
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekomChristina Azzam
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldQualys
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Frank Dawson
 
Sit in a common area and observe. This may be in your office, a co.docx
Sit in a common area and observe. This may be in your office, a co.docxSit in a common area and observe. This may be in your office, a co.docx
Sit in a common area and observe. This may be in your office, a co.docxjennifer822
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
 
Computer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network ConferenceComputer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network ConferenceEric Vanderburg
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are ComingErnest Staats
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are comingErnest Staats
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection ProgramsMichael Annis
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxTRSrinidi
 

Similar a Applied data analytics_v1_6.23 (20)

Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekom
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless World
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
Privacy_Engineering_Privacy Assurance_Lecture-Ecole_Polytechnic_Nice_SA-20150127
 
Sit in a common area and observe. This may be in your office, a co.docx
Sit in a common area and observe. This may be in your office, a co.docxSit in a common area and observe. This may be in your office, a co.docx
Sit in a common area and observe. This may be in your office, a co.docx
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Computer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network ConferenceComputer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network Conference
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
week 7.pptx
week 7.pptxweek 7.pptx
week 7.pptx
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Forecast 2014: eDiscovery and Forensics
Forecast 2014: eDiscovery and Forensics Forecast 2014: eDiscovery and Forensics
Forecast 2014: eDiscovery and Forensics
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptx
 

Más de John C. Havens

The Togetherland Workshop to address Loneliness and Isolation
The Togetherland Workshop to address Loneliness and IsolationThe Togetherland Workshop to address Loneliness and Isolation
The Togetherland Workshop to address Loneliness and IsolationJohn C. Havens
 
Intro to ESG Standards and Regulations: An Introduction to Technologically Ac...
Intro to ESG Standards and Regulations: An Introduction to Technologically Ac...Intro to ESG Standards and Regulations: An Introduction to Technologically Ac...
Intro to ESG Standards and Regulations: An Introduction to Technologically Ac...John C. Havens
 
Counting The Caregivers
Counting The CaregiversCounting The Caregivers
Counting The CaregiversJohn C. Havens
 
The Council on Extended Intelligence
The Council on Extended Intelligence The Council on Extended Intelligence
The Council on Extended Intelligence John C. Havens
 
Prioritizing Human Wellbeing for Ethical AI - MyData2017
Prioritizing Human Wellbeing for Ethical AI - MyData2017Prioritizing Human Wellbeing for Ethical AI - MyData2017
Prioritizing Human Wellbeing for Ethical AI - MyData2017John C. Havens
 
Individual-In-The-Loop (for Ethically Aligned Artificial Intelligence)
Individual-In-The-Loop (for Ethically Aligned Artificial Intelligence)Individual-In-The-Loop (for Ethically Aligned Artificial Intelligence)
Individual-In-The-Loop (for Ethically Aligned Artificial Intelligence)John C. Havens
 
Artificial Intelligence and Consciousness (Empiricist League Presentation)
Artificial Intelligence and Consciousness (Empiricist League Presentation)Artificial Intelligence and Consciousness (Empiricist League Presentation)
Artificial Intelligence and Consciousness (Empiricist League Presentation)John C. Havens
 
Ethical Considerations in the Design of Artificial Intelligence
Ethical Considerations in the Design of Artificial IntelligenceEthical Considerations in the Design of Artificial Intelligence
Ethical Considerations in the Design of Artificial IntelligenceJohn C. Havens
 
The Artificial and The Divine - Week Three
The Artificial and The Divine - Week ThreeThe Artificial and The Divine - Week Three
The Artificial and The Divine - Week ThreeJohn C. Havens
 
Positive Psychology in the Age of Artificial Intelligence
Positive Psychology in the Age of Artificial IntelligencePositive Psychology in the Age of Artificial Intelligence
Positive Psychology in the Age of Artificial IntelligenceJohn C. Havens
 
The Artificial and The Divine - The Delight in the Data
The Artificial and The Divine - The Delight in the DataThe Artificial and The Divine - The Delight in the Data
The Artificial and The Divine - The Delight in the DataJohn C. Havens
 
The Artificial and The Divine, Week One
The Artificial and The Divine, Week OneThe Artificial and The Divine, Week One
The Artificial and The Divine, Week OneJohn C. Havens
 
Values and Digital Identity: How Artificial Intelligence Becomes Genuine
Values and Digital Identity: How Artificial Intelligence Becomes GenuineValues and Digital Identity: How Artificial Intelligence Becomes Genuine
Values and Digital Identity: How Artificial Intelligence Becomes GenuineJohn C. Havens
 
Heartificial Intelligence - Embracing Our Humanity to Maximize Our Machines
Heartificial Intelligence - Embracing Our Humanity to Maximize Our MachinesHeartificial Intelligence - Embracing Our Humanity to Maximize Our Machines
Heartificial Intelligence - Embracing Our Humanity to Maximize Our MachinesJohn C. Havens
 
Connecting Happiness To Action
Connecting Happiness To ActionConnecting Happiness To Action
Connecting Happiness To ActionJohn C. Havens
 
The Science of Happiness - Wellbeing for Employees
The Science of Happiness - Wellbeing for EmployeesThe Science of Happiness - Wellbeing for Employees
The Science of Happiness - Wellbeing for EmployeesJohn C. Havens
 
Worth Versus Wealth in the Happiness Economy
Worth Versus Wealth in the Happiness EconomyWorth Versus Wealth in the Happiness Economy
Worth Versus Wealth in the Happiness EconomyJohn C. Havens
 
Hacking H(app)iness - My Keynote Presentation for The Future of Consumer Inte...
Hacking H(app)iness - My Keynote Presentation for The Future of Consumer Inte...Hacking H(app)iness - My Keynote Presentation for The Future of Consumer Inte...
Hacking H(app)iness - My Keynote Presentation for The Future of Consumer Inte...John C. Havens
 
Ccisda jch presentation
Ccisda jch presentationCcisda jch presentation
Ccisda jch presentationJohn C. Havens
 

Más de John C. Havens (20)

The Togetherland Workshop to address Loneliness and Isolation
The Togetherland Workshop to address Loneliness and IsolationThe Togetherland Workshop to address Loneliness and Isolation
The Togetherland Workshop to address Loneliness and Isolation
 
Intro to ESG Standards and Regulations: An Introduction to Technologically Ac...
Intro to ESG Standards and Regulations: An Introduction to Technologically Ac...Intro to ESG Standards and Regulations: An Introduction to Technologically Ac...
Intro to ESG Standards and Regulations: An Introduction to Technologically Ac...
 
Counting The Caregivers
Counting The CaregiversCounting The Caregivers
Counting The Caregivers
 
The Council on Extended Intelligence
The Council on Extended Intelligence The Council on Extended Intelligence
The Council on Extended Intelligence
 
Prioritizing Human Wellbeing for Ethical AI - MyData2017
Prioritizing Human Wellbeing for Ethical AI - MyData2017Prioritizing Human Wellbeing for Ethical AI - MyData2017
Prioritizing Human Wellbeing for Ethical AI - MyData2017
 
Individual-In-The-Loop (for Ethically Aligned Artificial Intelligence)
Individual-In-The-Loop (for Ethically Aligned Artificial Intelligence)Individual-In-The-Loop (for Ethically Aligned Artificial Intelligence)
Individual-In-The-Loop (for Ethically Aligned Artificial Intelligence)
 
Artificial Intelligence and Consciousness (Empiricist League Presentation)
Artificial Intelligence and Consciousness (Empiricist League Presentation)Artificial Intelligence and Consciousness (Empiricist League Presentation)
Artificial Intelligence and Consciousness (Empiricist League Presentation)
 
Ethical Considerations in the Design of Artificial Intelligence
Ethical Considerations in the Design of Artificial IntelligenceEthical Considerations in the Design of Artificial Intelligence
Ethical Considerations in the Design of Artificial Intelligence
 
The Greeks
The GreeksThe Greeks
The Greeks
 
The Artificial and The Divine - Week Three
The Artificial and The Divine - Week ThreeThe Artificial and The Divine - Week Three
The Artificial and The Divine - Week Three
 
Positive Psychology in the Age of Artificial Intelligence
Positive Psychology in the Age of Artificial IntelligencePositive Psychology in the Age of Artificial Intelligence
Positive Psychology in the Age of Artificial Intelligence
 
The Artificial and The Divine - The Delight in the Data
The Artificial and The Divine - The Delight in the DataThe Artificial and The Divine - The Delight in the Data
The Artificial and The Divine - The Delight in the Data
 
The Artificial and The Divine, Week One
The Artificial and The Divine, Week OneThe Artificial and The Divine, Week One
The Artificial and The Divine, Week One
 
Values and Digital Identity: How Artificial Intelligence Becomes Genuine
Values and Digital Identity: How Artificial Intelligence Becomes GenuineValues and Digital Identity: How Artificial Intelligence Becomes Genuine
Values and Digital Identity: How Artificial Intelligence Becomes Genuine
 
Heartificial Intelligence - Embracing Our Humanity to Maximize Our Machines
Heartificial Intelligence - Embracing Our Humanity to Maximize Our MachinesHeartificial Intelligence - Embracing Our Humanity to Maximize Our Machines
Heartificial Intelligence - Embracing Our Humanity to Maximize Our Machines
 
Connecting Happiness To Action
Connecting Happiness To ActionConnecting Happiness To Action
Connecting Happiness To Action
 
The Science of Happiness - Wellbeing for Employees
The Science of Happiness - Wellbeing for EmployeesThe Science of Happiness - Wellbeing for Employees
The Science of Happiness - Wellbeing for Employees
 
Worth Versus Wealth in the Happiness Economy
Worth Versus Wealth in the Happiness EconomyWorth Versus Wealth in the Happiness Economy
Worth Versus Wealth in the Happiness Economy
 
Hacking H(app)iness - My Keynote Presentation for The Future of Consumer Inte...
Hacking H(app)iness - My Keynote Presentation for The Future of Consumer Inte...Hacking H(app)iness - My Keynote Presentation for The Future of Consumer Inte...
Hacking H(app)iness - My Keynote Presentation for The Future of Consumer Inte...
 
Ccisda jch presentation
Ccisda jch presentationCcisda jch presentation
Ccisda jch presentation
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Applied data analytics_v1_6.23

  • 1.
  • 2.
  • 4.
  • 5.
  • 6. • IEEE P7000: Model Process for Addressing Ethical Concerns During System Design • IEEE P7001: Transparency of Autonomous Systems • IEEE P7002: Data Privacy Process • IEEE P7003: Algorithmic Bias Considerations • IEEE P7004: Standard on Child and Student Data Governance • IEEE P7005: Standard on Employer Data Governance • IEEE P7006: Standard on Personal Data AI Agent Working Group
  • 7.
  • 8.
  • 9.
  • 10. Modern consent is deceptive by design.
  • 11. March, 2025 Your first born child In using this service, you agree to relinquish your first born child to F-Secure, as and when the company requires it. In the event that no children are produced, your most beloved pet will be taken instead. The terms of this agreement stand for eternity.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Ann Cavoukian – Information & Privacy Commissioner Ontario, Canada 1. Proactive not Reactive; Preventive not Remedial: PbD anticipates and prevents Privacy-invasive events before they happen 2. Privacy as the Default Setting: PbD seeks to deliver the maximum degree of Privacy by ensuring that personal data are automatically protected in any given IT system or business practice 3. Privacy embedded into Design: It is not bolted on as an add-on, after the fact. It’s an essential component of the core functionality being delivered 4. Full-functionality – Positive Sum not Zero Sum: no trade-offs, no false dichotomies 5. End to End Security – Full Lifetime Protection: cradle to grave lifecycle management of information, end- to-end 6. Visibility and Transparency – Keep it Open: operating according to the stated promises and objectives, subject to independent verification 7. Respect for User Privacy – Keep it User-Centric: strong Privacy defaults, appropriate notice, and empowering user-friendly options Privacy by Design (PbD) 7 Fundamental Principles
  • 20. 12 Responsibilities of a Data Controller 1. Inform participants 2. Obtain informed consent 3. Ensure the data held is accurate 4. Delete personal data when it is no longer needed => delete or anonymize 5. Protect against unauthorized destruction, loss, alteration and disclosure => security 6. Contract with Data Processors responsibly 7. Take care transferring data out of Europe 8. If you collect “special” categories of data, get specialist advice 9. Deal with any data subject access requests 10. If the assessment is high stakes, ensure there is review of any automated decision making 11. Appoint a Data Protection Officer (DPO) and train staff 12. Work with supervisory authorities and respond to complaints Source: http://blog.questionmark.com/responsibilities-of-a-data-controller-when-assessing-knowledge-skills-and-abilities
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.

Notas del editor

  1. Values By Design   Algorithms are getting to know us better than we know ourselves.  We’ve been trained to sacrifice privacy for personalization that’s eroding our identity and agency in an algorithmic world.  Today we can’t see how our consciousness has been commoditized but in the future of Mixed Reality we’ll witness how others control our data and our lives.   Thankfully, precedents set in the EU regarding people’s data are beginning to turn the tide of this identity obfuscation. Individuals are learning to control their information via personal clouds and Life Management Platforms prioritizing their subjective truth.  It is only be redefining innovation to utilize applied ethics that modern organizations will honor user’s Values By Design and increase human wellbeing versus exponential wealth. 
  2. http://standards.ieee.org/develop/indconn/ec/ead_personal_data.pdf
  3. http://www.careersinbloom.com/2015/06/the-elephant-in-the-room-how-to-really-answer-the-weakness-question/
  4. https://medium.com/the-internet-of-me/the-internet-of-me-an-infographic-340d87658994
  5. This is the ON and OFF switch http://www.securityforrealpeople.com/2014/10/the-high-price-of-free-wifi-your-eldest.html (2014) Recently security firm F-Secure conducted an experiment on the streets of London, setting up a phony Internet hotspot. Dozens of people connected to this phony hotspot and used it to read mail, search videos, and in general browse the Internet, oblivious to the fact that the owner of the hotspot could watch everything they did - including viewing their passwords and reading their email. Even more bizarre, for a portion of the experiment the researchers set up a "terms of use" page that users had to acknowledge before they could use the hotspot. One of the conditions stated that the user permanently and for eternity gave up their firstborn child in exchange for the free wifi usage - what one reporter called the "Herod Clause." Believe it or not, 6 people agreed to the terms.
  6. https://dailyreckoning.com/profiting-before-the-robot-slaves-revolt/
  7. http://www.itsecurityguru.org/2017/04/04/need-know-gdpr/
  8. https://www.itgovernance.co.uk/blog/eu-gdpr-infographic-what-the-new-regulation-means-in-1-minute/
  9. https://www.itgovernance.co.uk/blog/eu-gdpr-infographic-what-the-new-regulation-means-in-1-minute/
  10. https://www.slideshare.net/AurliePols/a-framework-of-purpose-and-consent-for-data-security-and-consumer-privacy?from_action=save
  11. https://www.slideshare.net/AurliePols/a-framework-of-purpose-and-consent-for-data-security-and-consumer-privacy?from_action=save
  12. https://blogs.harvard.edu/vrm/2013/01/22/vrm-taking-root-in-france/