We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byKailey Bollom
Modified about 1 year ago
© GSMA 2013 Logo International Conference of Data Protection and Privacy Commissioners, Mauritius. 14 October 2014 Data Protection and Privacy in the developing world Restricted - Confidential Information © GSM Association 2013 All GSMA meetings are conducted in full compliance with the GSMA’s anti-trust compliance policy
© GSMA 2013 GSMA By The Numbers
© GSMA 2013 ASEAN Our ASEAN people, in all their diversity and creativity, are the most crucial factor on our journey. We need to continually engage the private sector as the key partner in making the AEC success
© GSMA 2013 Data Protection and Privacy: patchwork of laws, regulations and industry approaches OpenID Connect ISO Privacy framework ISO Privacy architecture framework ISO A framework for identity management Healthcare, education, banking ETSI/3GPP/IETF/IEEE Data Retention and law enforcement obligations Mandatory SIM Card Registration (biometric) Restrictions on use of data for VAS without consent Restrictions on 3 rd party sharing of data Network and communications security Prohibitions on overseas transfers Prior approval to deploy bulk encrytption SIM Card Registration Access to private sector data eGov services eID Provides individual rights Obliges transparency of processing Imposes data minimisation and purpose limitation Can process only by consent/contract/lega l obligation Restricts overseas transfers Security obligations Data Protection law Government Standards/vertical ePrivacy/Telco regulation/licence conditions/Codes of Conduct
© GSMA 2013 It’s not just about the law: consumer attitudes matter
© GSMA 2013 GSMA approaches
© GSMA 2013 Mobile – is it different?
© GSMA Thank you pat [at] walshe [dot] gsma [dot] com
Information for Students MGH Institute of Health Professions Use your down arrow or click your mouse to advance through the presentation.
22nd MARCH 2006SWAMI CONFERENCE SWAMI- presentation on legal aspects Serge Gutwirth Paul De Hert Wim Schreurs Anna Moscibroda.
Public Administration use of Social Networks - Data Protection Implications European Public Administration Network, Dublin Castle, 5 April 2013 Billy Hawkes.
Strictly Confidential Martin Whitehead – GSMA Europe 12 January 2011 EPP Hearing: A Radio Spectrum Policy for Europe Panel 2: Impact of Digital Switchover.
© 2007 TransUnion LLC All Rights Reserved Binding Corporate Rules – Global Implications Conference on Cross Border Data Flows and Privacy October 16, 2007.
NIGB NATIONAL INFORMATION GOVERNANCE BOARD FOR HEALTH AND SOCIAL CARE.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
1 NAESB Data Privacy Task Force February 16, 2011.
PRIVACY ASPECTS OF RE- USE OF PSI: BETWEEN PRIVATE AND PUBLIC SECTOR Bart van der Sloot Institute for Information Law University of Amsterdam.
Little cloud – big difference Matt Healy – Chairman, OzHub April 2012.
Office of the Information and Privacy Commissioner, Ontario, Canada Panel on Privacy Centre for Information Integrity & Information Systems Assurance,
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.
1 JCAHO –A HIPAA Business Associate National HIPAA Summit Anthony J. Tirone, JD,MBA Director, Federal Relations Joint Commission on Accreditation of Healthcare.
ICPSR and the Data Seal of Approval Mary Vardigan Assistant Director, ICPSR December 10, 2012.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Meeting with the Tanzanian ICT.
MEDEFs View on Dot EU Domain Day – 5 novembre 2002 – Palazzo Stelline – Milano Catherine GABAY – Director Innovation and Research - Medef.
People Ready Business Graham Harrop Director, Government Microsoft UK Ltd Transformational Government Enabled by Technology.
Convention on the Rights of Persons with Disabilities and its Optional Protocol.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa Meeting with Data Protection Law.
From Identity and Authentication point solutions to SOA and ESB – From Identity and Authentication point solutions to SOA and ESB –NZ Gov IdM Architectural.
Reconciling the sharing of research data with ethical review for research with people as participants Dr Veerle Van den Eynden UK Data Archive Data support.
NIGB Information Governance and Confidentiality Clinical Audit and Improvement Conference February 2011 Karen Thomson Information Governance Manager.
| Implications for Health Information Exchange – MetroChicago January 2011.
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
GBEC April Funded by employers to assist them to build their disability confidence 110 members, public and private sector Provide services that.
Intellectual Property Rights, Investment and Transfer of Technology in the Pharmaceutical Sector Patrizia Carlevaro Head of the International Aid Unit.
Whois Task Force GNSO Public Forum Wellington March 28, 2006.
International partnership of law companies Customs & Corporate Lawyers, based on the principles of observance of high professional standards, mutual trust,
Digital Identity is a set of attributes of a person or company in a specific domain. An entity has multiple Digital Identities. Identity is a set of attributes.
© 2016 SlidePlayer.com Inc. All rights reserved.