We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byKailey Bollom
Modified over 2 years ago
© GSMA 2013 Logo International Conference of Data Protection and Privacy Commissioners, Mauritius. 14 October 2014 Data Protection and Privacy in the developing world Restricted - Confidential Information © GSM Association 2013 All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy
© GSMA 2013 GSMA By The Numbers 2 7.2 3.6
© GSMA 2013 ASEAN Our ASEAN people, in all their diversity and creativity, are the most crucial factor on our journey. We need to continually engage the private sector as the key partner in making the AEC success
© GSMA 2013 Data Protection and Privacy: patchwork of laws, regulations and industry approaches OpenID Connect ISO 29100 Privacy framework ISO 29101 Privacy architecture framework ISO 24760 A framework for identity management Healthcare, education, banking ETSI/3GPP/IETF/IEEE Data Retention and law enforcement obligations Mandatory SIM Card Registration (biometric) Restrictions on use of data for VAS without consent Restrictions on 3 rd party sharing of data Network and communications security Prohibitions on overseas transfers Prior approval to deploy bulk encrytption SIM Card Registration Access to private sector data eGov services eID Provides individual rights Obliges transparency of processing Imposes data minimisation and purpose limitation Can process only by consent/contract/lega l obligation Restricts overseas transfers Security obligations Data Protection law Government Standards/vertical ePrivacy/Telco regulation/licence conditions/Codes of Conduct
© GSMA 2013 It’s not just about the law: consumer attitudes matter
© GSMA 2013 GSMA approaches
© GSMA 2013 Mobile – is it different?
© GSMA 2013 8 Thank you pat [at] walshe [dot] gsma [dot] com www.gsma.com/mobileprivacy
Restricted - Confidential Information © GSM Association 2012 All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy.
The GSMA July 2014 Restricted - Confidential Information
The Global API Federation
Data Protection Law In India iPleaders and Intelligent Legal Risk management LLP.
Personal Data (Privacy) Ordinance Hong Kong Personal Data (Privacy) Ordinance Hong Kong by Stephen Lau Privacy Commissioner for Personal Data Hong Kong.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
The Geopolitics of Personal Data and the Governance of Privacy Colin J. Bennett Department of Political Science University of Victoria BC, Canada
PRIVACY ASPECTS OF RE-USE OF PSI: BETWEEN PRIVATE AND PUBLIC SECTOR
Osborneclarke.de OBA Breakfast Seminar 22 January 2013 Stephen Groom OC London Action points for UK advertisers.
© GSMA 2011 Vikram Raval, Regulatory Manager, GSMA International Telecommunication Regulations: The Mobile Industry Perspective Restricted - Confidential.
Your Code of Conduct: Data Protection & Compliance Your Code of Conduct: Data Protection & Compliance for Charities.
STRUCTURE AND FUNCTIONS OF COMPETITION AGENCIES. GENERAL STRUCTURE OF CA CAs differ in size, structure and complexity The structure depicts power distribution.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
Restricted - Confidential Information © GSM Association 2014 All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy.
World Café: Reaping the benefits of eID Dave Kearns, Senior Analyst, Kuppinger-Cole 9/29/2011 Reaping the benefits of eID World Café - Authentication.
EHealth/mHealth Gisele Roesems Deputy Head of Unit Health and Well-Being DG CONNECT EUROPEAN COMMISSION 2 nd International Conference on Health Informatics.
Key Points for a Privacy Programme for Multinationals Steve Coope.
The Future Digital Identity Landscape in Europe Timothée Mangenot, chairman 14th of December, 2015 ACSIEL partners day.
Keeping on top of the Cloud - Compliance from a Regulator’s Perspective Henry Chang, IT Advisor Office of the Privacy Commissioner for Personal Data, Hong.
Financial Services Privacy - the interaction of the privacy and financial services regulatory systems Chris Connolly Financial Services Consumer Policy.
As defined in the Generally Accepted Privacy Principles, “privacy” refers to the rights and obligations of individuals and organizations with respect to.
Regulatory Transparency and Efficiency in the Communications Industry in Australia Jennifer Bryant Office of Regulation Review Australia.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
1 Allan Chiang, S.B.S. Privacy Commissioner for Personal Data 8 July 2013 Asian Privacy Scholars Network Conference Balance between Access to Public Domain.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Do Not Call Register scheme Peter Sutton Manager Do Not Call Taskforce International Training Program 12 September 2006.
Protection of Personal Information Act An Analysis on the impact.
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Measures to Protect Legitimate Public Welfare Objectives as an Exception of Indirect Expropriation Kind of clause that must be included – an experience.
Yukiko Ko Binding Corporate Rules – Global Implications Conference on Cross Border Data Flows and Privacy October 16, 2007.
Data-Sharing and Governance Consultation ANALYSIS OF RESPONSES.
Freedom to Provide Services Clause Why does the Country of Origin Principle not exist anymore? Martin Frohn.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
Data Protection: The Law. EU & Irish Legislation Data Protection Directive 95/46/EC Electronic Privacy Directive 2002/58/EC EUROPOL etc Data Protection.
Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Per Anders Eriksson
Privacy and Data Breach Issues Kirk Herath, VP, Chief Privacy Officer, Nationwide & Dino Tsibouris, Founding Principal, Tsibouris & Associates.
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
PIPEDA and Receivables Management Robin Gould-Soil Receivables Management Association of Canada November 16, 2011.
A European View of Privacy Protection John Woulds Director of Operations UK Data Protection Commissioner National Conference on Privacy, Technology & Criminal.
Chapter 4: Security Policy Documents & Organizational Security Policies.
Personal Data Privacy and The Internet by Stephen Lau Privacy Commissioner for Personal Data, Hong Kong SAR at the Joint Conference of the OECD, HCOPIL,
© 2017 SlidePlayer.com Inc. All rights reserved.