We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byHaley Froom
Modified about 1 year ago
1 Wonk, Meet Geek Big Data Tools for Big Data [Governance, Risk, and] Compliance Jim Adler VP Products & Chief Privacy Officer Metanautix @jim_adler 1
2 ©2014 METANAUTIX. Study Linking Autism to MMR Vaccine Retracted Results couldn’t be reproduced 4 counts, falsifying data No informed consent 12 counts, child abuse No review board Received $670K from anti-vaccine groups
CONFIDENTIAL. ©2014 METANAUTIX.
4 ©2014 METANAUTIX. Data Complexity Conundrum is Everywhere Siloed data, technology, and communities DIFFERENT Formats DISCONNECTED Silos LARGE Volumes
CONFIDENTIAL. ©2014 METANAUTIX. 5 Austin Alleman, 2014 Governance, Risk, Compliance (GRC) Professional
CONFIDENTIAL. ©2014 METANAUTIX. 6 Austin Alleman, 2014 GRC Professional BIG DATA INTERNATIONAL AIRPORT
7 ©2014 METANAUTIX. “Computers are useless. They can only give you answers.” − Pablo Picasso data wisdom TIME
8 ©2014 METANAUTIX. What is a paradigm? Current Paradigm Anomalies Crisis New Paradigm
9 ©2014 METANAUTIX. Newton versus Einstein Paradigm Newtown Mechanics Anomaly Unknown how gravity works Crisis Gravity can’t go faster than light Newton wrong New Paradigm General Relativity
10 ©2014 METANAUTIX. Today’s Business Communities and Their Paradigms Suits Make money Geeks Make it work Wonks Stay out of trouble
11 ©2014 METANAUTIX. Felton’s 3rd Law: Lawyers look to technology, and techies look to law.
12 ©2014 METANAUTIX. The Current GRC Paradigm Fair Information Practice Principles Access Accuracy Security Audit User Consent Data Minimization Specific Purpose Use Limitation Belmont & Menlo Reports Respect for Persons Beneficence Justice Respect for Law and Public Interest
13 ©2014 METANAUTIX. Houston, we have a problem
14 ©2014 METANAUTIX. Source of Anomalies Everything is digital Large scale Diverse technologies Diverse teams Legally uncertain environment both in US and abroad
15 ©2014 METANAUTIX. Contracts are too early
16 ©2014 METANAUTIX. Audits are too late Austin Alleman, 2014
CONFIDENTIAL. ©2014 METANAUTIX. If You Have Something You Don't Want Anyone To Know, Maybe You Shouldn't Be Doing It? CNBC, Mar 2010 Eric Schmidt, CEO, Google …shifting policymakers’ and regulators’ focus toward controlling the use of data, rather than just its collection, would empower citizens. Craig Mundie Foreign Affairs, Apr 2014 Former Chief Research and Strategy Officer. [FIPPs flexibilty] means relaxing data minimization and consent requirements while emphasizing transparency, access, and accuracy. Northwestern Journal of Technology, Apr 2013 Omer Tene, Haim Striks Law Jules Polonetsky, Future of Privacy Forum “The OECD Privacy Principles … need updating, so that we can ensure effective privacy protection in the future – while enabling the many benefits … that Big Data promises to bring. Reinventing Privacy Principles for the Big Data Age, Dec 2013 Viktor Mayer-Schönberger, Oxford Professor Fred Cate, Indiana University Peter Cullen, Microsoft A revolution is afoot in privacy regulation. The Potemkinism of Privacy Pragmatism Slate Magazine, Sep 2014 Chris Hoofnagle, Berkeley Law
18 ©2014 METANAUTIX. Fracturing FIPPs Consent Data Minimization Specific Purpose Use Limitation Consent Data Minimization Specific Purpose Use Limitation Access Accuracy Security Audit Access Accuracy Security Audit Consent Data Minimization Specific Purpose Use Limitation
19 ©2014 METANAUTIX. “The beatings will continue until morale improves.” Unthinkable Radical Acceptable Sensible Popular Policy Facebook Newsfeed Ad Targeting Facebook Beacon Pre-crime Overton Window Girls Around Me
20 ©2014 METANAUTIX. Paradigm Change is Uncertain Progress is not a line toward truth but progress away from what’s wrong. Structure of Scientific Revolution Thomas S. Kuhn H.L. Mencken What the world turns to, when it is cured on one error, is usually simply another error, and maybe one worse than the first one.
CONFIDENTIAL. ©2014 METANAUTIX. 21 PERILS PLACES PLAYERS http://jimadler.me/post/14171086020/creepy-is-as-creepy-does
22 ©2014 METANAUTIX. MORE PRIVATE PLACES MORE PLAYER POWER GAP Places-Players-Perils Cases
23 ©2014 METANAUTIX. Motive-Planning-Execution MotivesMotives PERILS PLACES PLAYERS PlanningPlanning ExecutionExecution
24 ©2014 METANAUTIX. “Can’t we all just get along?” − Rodney King Social Entrepreneur High-Tech Mercenary Responsible Innovator Traditional Capitalist
25 ©2014 METANAUTIX. Criminals Lies, Damn Lies, and NYC’s Stop & Frisk All NYC Residents Minorities 50% Bayes’ Rule 90% of Criminals are Minorities
26 ©2014 METANAUTIX. “Half the money I spend is wasted; the trouble is I don't know which half.” If it’s not ok to stop 99% of the general population for nothing, why is it ok to stop 91% of minorities for nothing? All NYC Residents Minorities 50% Criminals 5% Bayes’ Rule 90% of Criminals are Minorities 10% of Criminals are Not Minorities
27 ©2014 METANAUTIX. Felon Classifier ANARCHY TYRANNY Threshold: 0.66 FP Rate: 5% FN Rate: 22% Threshold: 0.66 FP Rate: 5% FN Rate: 22% Threshold: 1.1 FP Rate: 1% FN Rate: 40% Threshold: 1.1 FP Rate: 1% FN Rate: 40% Threshold: -1.82 FP Rate: 19% FN Rate: 0% Threshold: -1.82 FP Rate: 19% FN Rate: 0% Bloomberg: http://bloom.bg/1eMtnug Blog post: http://goo.gl/691pzMhttp://bloom.bg/1eMtnughttp://goo.gl/691pzM
28 ©2014 METANAUTIX. John Foreman’s Excellent Disney Adventure
29 ©2014 METANAUTIX. OKCupid: “We Experiment on Human Beings” http://blog.okcupid.com/index.php/we-experiment-on-human-beings/ I would love it if transparency truly allayed anxiety in an informed, nonexplosive way. But in practice, it might increase anxiety. New York Times, Sep 2014 Christain Rudder, President, OKCupid Sunlight is said to be the best of disinfectants; electric light the most efficient policeman. Louis Brandeis Associate Justice, US Supreme Court, 1916-1939
30 ©2014 METANAUTIX. Data Mapping Across the Enterprise Who saw what and when? Database logs Unauthorized copying Retention and deletion What records are moving overseas
31 ©2014 METANAUTIX. Document Similarity MinHash and Jaccard Similarity A revolution is afoot in privacy regulation. regulation privacy revolution footafoot http://infolab.stanford.edu/~ullman/mmds/ch3.pdf 8ccd811c0e7d419d101cf43cafe391797f6bca28df0f32552962c945eca0683d MD5:
CONFIDENTIAL. ©2014 METANAUTIX. Watch your thoughts; they become words. Watch your words; they become actions. Watch your actions; they become habit. Watch your habits; they become character. Watch your character; it becomes your destiny. Lao Tzu 600 BC Watch your thoughts for they become words. Watch your words for they become actions. Watch your actions for they become habits. Watch your habits for they become your character. And watch your character for it becomes your destiny. What we think, we become. Margaret Thatcher ~1980 Watch your thoughts, for they become words. Chose your words, for they become actions. Understand your actions, for they become habits. Study your habits, for they will become your character. Develop your character, for it becomes your destiny. Ralph Waldo Emerson ~1850
33 ©2014 METANAUTIX. Document Similarity Lao TzuLT MTMargaret Thatcher character watch character become character watch habit watch habit thought become word word watch word become word watch watch character it become action watch it become destiny word become action become habit watch character it become watch action become habit become character watch habit become watch word become action watch action watch thought become action become habit we think we become destiny what become character and and watch character think we become what we think destiny what we character and watch MinHash and Jaccard Similarity U
34 ©2014 METANAUTIX. Document Similarity Lao TzuLT RWERalph Waldo Emerson habit watch habit watch habit become become word watch watch character it character watch character become character watch become habit watch become action watch watch action become habit become character word watch word action watch action watch word become thought become word it become destiny watch thought become character it become action become habit word become action become word chose become habit study become character develop become action understand chose word become word chose word character develop character will become character develop character it habit study habit study habit will understand action become habit will become action understand action MinHash and Jaccard Similarity U
35 ©2014 METANAUTIX. Document Similarity Ralph Waldo EmersonRWE MTMargaret Thatcher become word chose become habit study become character develop become action understand chose word become word chose word character develop character will become character develop character it habit study habit study habit will understand action become habit will become action understand action thought become word it become destiny watch thought become character it become action become habit word become action habit watch habit word watch word we think we watch habit become become word watch watch character it become destiny what watch action become become character and and watch character think we become become habit watch what we think destiny what we character and watch become action watch habit become character action watch action watch word become MinHash and Jaccard Similarity U
36 ©2014 METANAUTIX. Data Flow Analytics Retail POS Attack Store 343 In-Store Database Servers In-Store Network Servers Regional Network Servers Regional Network Servers National Network Servers Store 729 In-Store Database Servers In-Store Network Servers 78828 6548 56613 18264 55032 62244
37 ©2014 METANAUTIX. Data Flow Analytics Retail POS Attack Register POSCard TxnsIn-Store Servers
CONFIDENTIAL. ©2014 METANAUTIX. … but then we reshape our tools … “We shape our tools … … and thereafter our tools shape us.” − Marshall McLuhan
39 ©2014 METANAUTIX. Toward a Unified Theory of Technology and Policy
40 Questions? Jim Adler VP Products & Chief Privacy Officer Metanautix @jim_adler 40
Privacy Rights Under Pressure Innovations in technology: photography, audio recording, motion pictures, computers, telecommunications, digital data,
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
ControlPoint The Eleventh Hour Presentation and ControlPoint Demonstration Abdullah Noman October, 2015.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Making Sense of the Social World 4th Edition Chapter 3: Ethics in Research.
Safeguarding Data to Ensure Effective Data Use Paige Kowalski |Director| State Policy & Advocacy July 2014.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
More Competitive, Lower Cost How Standardization Fuels Growth Kirk Lowery VP – Strategic Customer Solutions.
FILE NUMBER Kent Grey, Partner 1 June 2012 Technology in Governance Risk-intelligent approach to the use of technology “in the Boardroom”
Copyright Myths. "If it doesn't have a copyright notice, it's not copyrighted." This was true in the past, but today almost all major nations follow the.
Brad Blake Director, New Media & Online Strategy Massachusetts Office of the Governor
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Incorporating Privacy Into Systems Development Methodology Phil Moleski Director Corporate Information Technology Branch Saskatchewan Health
Why Compliance Legal and Regulatory requirements Organizational governance requests Internal and external threats Today’s Challenges Duplicate solutions.
The Evolving IG Lead Role Phil Walker IGA. The IG Lead Role I am constantly surprised by the breadth and variety of work undertaken by IG Leads, but there.
Fundamental Principles of American Democracy Standard: 12.1 Students explain the fundamental principles and moral values of American democracy as expressed.
Lesson Objectives: By the end of this lesson you will be able to: *Identify the three key economic questions that all societies must answer. *Analyze.
INTERNAL CONTROLS What are they? Why should I care?
Why Information Governance wont will let you do that! and other IG myths Barry Jackson Information Governance & Security Manager – North East Lincolnshire.
Data Governance 101. Agenda Purpose Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts FERPA—The Law Q & A.
Chapter 3-1 Ch. 3 –Data Modeling Designing an efficient and effective database that meets users’ needs.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Hosted by Panel Discussion: “Regulatory compliance -- The effect on information management and the storage industry” Moderator: Peter Gerr, senior research.
Duke Medicine IT Strategy Jeffrey Ferranti, MD Chief Information Officer / VP Medical Informatics Duke Medicine April 17, 2015.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
Big Data Analytics: An Ethical Question Leah Korganowski COMP 607 – Fall 2015.
Data Governance: Addressing the Big Data Challenge IT.CAN 2015 Information Technology Law Spring Forum May 4, 2015 Adam Kardash Partner, Privacy & Data.
E-Reach Collaborative Points of View Dr John McCarthy Director Oxford Integrated Systems.
Computer Viruses. Malware Malicious software Programs designed to infiltrate or damage a computer system without the owner's informed consent. Viruses,
SEC303 Assessing and Managing Privacy in the Enterprise JC Cannon Privacy Strategist.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
What’s in it for Me?. Recognition Program The Recognition Program requires extra work on the part of a Department. Why do we need to do it???
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
A Multi-Disciplinary Approach. Darran Boyer, Moderator Alicia (Ali) Craig-Rodriguez President, Comprehensive Neuroscience, Inc. Kim Lerner Chief Executive.
Privacy and Data Breach Issues Kirk Herath, VP, Chief Privacy Officer, Nationwide & Dino Tsibouris, Founding Principal, Tsibouris & Associates.
What Institutional Researchers Should Know about the IRB Susan Thompson Senior Research Analyst Office of Institutional Research Presented at the Texas.
Blazent / ServiceNow Messaging Guide. Transforming data into actionable intelligence Improve business outcomes by contextualizing data to make informed.
360 Security Model Holistic Approach to Security.
Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri Steps To Secure Your Data.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
E-Safety. A great place… Image by: Shutterstock/nasirkhan As we have discussed over the last few lessons, the Internet is a great tool for sharing information,
Olof Nilsson. Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
Hart District Acceptable Use Policy Acceptable Use Policy.
Born in Baltimore, Maryland in 1905 Grew up during time of segregation He was smart and curious. His father taught him to debate at early age. Thurgood.
Employee privacy in a global company Sandra Kelman Privacy Manager (Asia Pacific) Privacy Issues Forum 30 March 2006.
© 2017 SlidePlayer.com Inc. All rights reserved.