We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byClark Causby
Modified over 2 years ago
(Health) Big Data, privacy and security Eerke Boiten joint UoKent Big Data Event Sep 2014
Hype? Who needs causation when you have correlation? Do organisations have a “Data Exhaust” or do they need a “Data Refinery”?
Security Honeypot effect Inappropriate clouds End-to-end?
Privacy impact Is big data personal information? Can big data generate personal information? PII = … Mitigation? (some also for Security) Access control Access modulation Access monitoring Research ethics, purpose, IG, auditing, …
Medical data: privacy, anonymity, and security What can we learn from the furore around the NHS data sharing plans (“care.data”)? Dr Eerke Boiten Director,
Information sharing: the view from the ICO Vicky Cetinkaya, Senior Policy Officer, ICO One Staffordshire Information Sharing Protocol launch event Stafford,
The Role of Security & Privacy in EA Program
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Introduction to the Summary Care Record (SCR)
Using Risk Management to Improve Privacy in Information Systems 1.
Creating a Risk Thinking Organisation Jobs and Enterprise, Regeneration and Resources and Culture and Well Being Select Committee 1 st June 2011.
CS591 Troy Hutchison. ISO series of standards have been specifically reserved by ISO for information security matters. Health Insurance Portability.
Chapter 13 Future Trends in Information Systems. Learning Objectives Upon successful completion of this chapter, you will be able to describe future trends.
WHY CHOOSE CEO-PE? We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
Community Pharmacy Summary Care Record (SCR) Privacy Officer End-user.
Project Risk Management
High dimensional genomic data, identifiability, and query-response Haixu Tang School of Informatics and Computing Indiana University, Bloomington.
Information Sharing Gateway Kevin Whittaker University Hospitals of Morecambe Bay NHS FT On behalf of Lancs & Cumbria IG Group.
Background Capabilities Concepts. Capabilities Project Management Project Development Technology Research & Review Industry Standards and Code Review.
KENT AND MEDWAY PUBLIC HEALTH OBSERVATORY Natasha Roberts Head of Health Intelligence.
MIS5001: Information Technology Management Ethics and Continuity Management Larry Brandolph
Information Security for the Data Management Professional Micheline Casey Chief Data Officer Federal Reserve Board.
A Joint Code of Practice Objectives and Summary Presentation
Vendor Management by Banks: How Law Firms Are Affected Peter Swire Huang Professor of Law and Ethics Scheller College of Business Georgia Institute of.
Privacy Protection Techniques & Security B. Claerhout.
CALDICOTT PRESENTATION. History Caldicott report published in 1997 and implemented in 1999 Inquiry chaired by Dame Fiona Caldicott.
The Evolution of IT Risk & Compliance February 2012 Rosalyn Ellis, CRISC Susan Hoffman, CISA,CGEIT 1.
Purpose The purpose of this process is to review circumstances surrounding critical events, including the Children’s Division’s initial response to.
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
Mastering Windows Network Forensics and Investigation Chapter 14: Other Audit Events.
Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010.
Ethics and Responsibility
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
Parents Action Group Jointly working with Commissioner for Children’s Services to link with adult services. Parent opportunities event organised 12 th.
Arrow color indicates specific subset of Security Service Desk Common Backplane API. is DC Backplane API impledmented by the Backplane Services. Devices.
Meaningful Use Security Risk Assessment (SRA): Resources for Eligible Professionals (EPs) Kim Bell, MHA, FACHE, PCMH-CCE Executive Director Georgia Health.
Purpose Present Drivers and Context for Firewalls Define Firewall Technology Present examples of Firewall Technology Discuss Design Issues Discuss Service.
About Sally Smoczynski Background in process improvement Consultant in Information Security, Service Management and Business Continuity Strong experience.
NIST Information Technology Laboratory Cloud Computing Program NIST Cloud Computing Program Current Activities Robert Bohn OASIS – International Cloud.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. Leveraging Information to Detect and Prevent Insider Attacks Phoram Mehta Senior.
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
REC support is. provided under cooperative agreement 90RC0025/01 from the Office of the National Coordinator for HIT, US Dept. of Health and Human Services.
Health and Safety Executive Health and Safety Executive Workforce Involvement Training Products David J Pearson.
Community Empowerment – User-led organisations Toby Williamson Head of Development & Later Life Dementia and ‘Big Society’ Think Tank.
1© Copyright 2010 EMC Corporation. All rights reserved. Hey Enterprise! I’ve got my OWN Cloud! IAPP 2010 Privacy Academy Wayne Pauley, EMC Corporation.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
What is Big Data? Dr Alasdair Rutherford University of Stirling.
Richard J Self - University of Derby 1 Governance Strategies for the Cloud, Big Data and other Technologies in Education Richard J Self BA LLM MBCS FHEA.
1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.
Training to care for people with dementia Dementia Training Partner logo here Training support Skills development Competency Assessment Scholarships Education.
PII / IDENTITY THEFT Is Your University an Open Market for ID Thieves? TACUA 2011 Carol Rapps CIA, CISA, CCSA, GLIT
What is Program Evaluation? Allegheny Intermediate Unit Evaluation, Grants, and Data.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
© 2017 SlidePlayer.com Inc. All rights reserved.