Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart.

Slides:



Advertisements
Similar presentations
Data Protection Law In India iPleaders and Intelligent Legal Risk management LLP.
Advertisements

The Data Protection (Jersey) Law 2005.
The Geopolitics of Personal Data and the Governance of Privacy Colin J. Bennett Department of Political Science University of Victoria BC, Canada
Identity Management In A Federated Environment Identity Protection and Management Conference Presented by Samuel P. Jenkins, Director Defense Privacy and.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Managing Personal Information - Australian Companies Outsourcing to India and the Philippines Professor Margaret Jackson and Marita Shelly.
Data Retention LIS 550 Winter 2010 Unsworth Tuesday, March 02, 2010.
Informed Consent and HIPAA Tim Noe Coordinating Center.
ZHRC/HTI Financial Management Training
1 The importance of credit bureau and need of legal framework for it LITHUANIA.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Class 13 Internet Privacy Law European Privacy.
Keeping on top of the Cloud - Compliance from a Regulator’s Perspective Henry Chang, IT Advisor Office of the Privacy Commissioner for Personal Data, Hong.
Data Protection Overview
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Module 2 Slide 1 NATIONAL COMMUNICATIONS COMMISSION REGULATORY PRACTICES WORKSHOP MODULE: 2 A The Independent Regulator.
1 Information Sharing Environment (ISE) Privacy Guidelines Jane Horvath Chief Privacy and Civil Liberties Officer.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Name Position Organisation Date. What is data integration? Dataset A Dataset B Integrated dataset Education data + EMPLOYMENT data = understanding education.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved Chapter Sixteen Lending Policies and Procedures.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process A course for the Department of Commerce contracting and contracting.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Data protection—training materials [Name and details of speaker]
Business Challenges in the evolution of HOME AUTOMATION (IoT)
Protection of Personal Information Act An Analysis on the impact.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
František Nonnemann Skopje, 10th October 2012 JHA Data protection and re-use of PSI as a tool for public control–CZ approach.
Business Models for Mobile Big Data PARTNERSHIPS FOR ACCESS TO THE DATA.
Judicial Training on Data Protection and Privacy Rights
Privacy and the Law.
GDPR (General Data Protection Regulation)
Privacy principles Individual written policies
Florida Information Protection Act of 2014 (FIPA)
LABOUR INSPECTION IN LAW AND PRACTICE
General Data Protection Regulation
General Data Protection Regulations Preparing for the upcoming changes in data protection law David Jones & Angharad Williams.
GDPR Readiness Project
Michael Biddington, UN ESCAP Statistics Division,
ENERGY REGULATION BOARD’S 20 YRS ANNIVERSARY WEEK LONG COMMEMORATION
Florida Information Protection Act of 2014 (FIPA)
The European Union General Data Protection Regulation (GDPR)
Bob Siegel President Privacy Ref, Inc.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
6 Principles of the GDPR and SQL Provision
General Data Protection Regulation
United Nations Development Account 10th Tranche Statistics and Data
State of the privacy union
RECORDS AND INFORMATION
Michael Biddington, UN ESCAP Statistics Division,
Employee Privacy and Privacy of Employee Information
QUALITY DEVELOPMENT IN COLOMBIA AND LATIN AMERICAN
General Data Protection Regulation
Institutional Framework, Resources and Management
The activity of Art. 29. Working Party György Halmos
HIPAA Security Standards Final Rule
International Statistics
BUSINESSEUROPE The Confederation of European Business
Overview of the recommendations regarding approximation of the Law on personal data protection to the new EU General data protection regulation Valerija.
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Student Privacy in the age of big data
18734: Foundations of Privacy
General Data Protection Regulation “11 months in”
Colorado “Protections For Consumer Data Privacy” Law
IT and Society Week 2: Privacy.
GDPR Workshop – Partnerships for Jewish Schools
A FRIENDLY REMINDER ON OTC DRUGS. DRUG REGULATIONS IN THE PHILIPPINES.
Presentation transcript:

Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart

 “Data is increasingly building up on who we are, who we know, where we are, where we have been and where we plan to go. Mining and analyzing this data lets us understand and predict how people behave at the individual, group and global level.”  “ The types, quantity and value of data being collected are vast: from personal profiles on sites like Facebook or Instagram to demographic data, from bank accounts to medical records to employment profiles. Our web searches and sites visited, including our likes and dislikes and purchase histories; our heart rates, food intake, home temperatures, whether our lights are on or off.” Source: Data and the fourth industrial revolution (2 Dec 2015) by Alan Marcus Senior Director, Head of Information Technology and Telecommunications Industries, World Economic Forum.

 TYPES OF RAW DATA (on line/off line)  PUBLIC  PERSONAL  PHYSICAL

Government/ Public Agencies  Philippine Statistical Authority  other gov’t agencies (LGUs, etc)  PAG ASA

Private Companies PLDT TALAS

Atos Global

Potential for big data use  Market research  Medical research  Search engines  Credit scores  Tax databases  Fight against terrorism  Combination with physical data  Migration, mobility, behavior, patterns, unlimited potential

Philippine Framework Other laws :  Anti-Wire tapping law (R.A. 4200)  NTC MC  DTI Department Administrative Order #8  Access Device Regulation Act  E Commerce Act (R.A. 8792)  Human Security Act of 2007  Cybercrime law

Data Privacy Act (R.A )

 PRINCIPLES OF DATA PROTECTION  Fair and lawful  Specific Purpose  Adequate  Retention  Rights  Security

 Draft implementing rules released ( 17 June 2016)  No final rules yet in place  Extra territorial application of the law ( sec. 6)  Person or entity processing personal data is found in the Phils.  Processing relates to personal data of Filipino or resident of the Phils.  Act of processing is done in the Philippines  Act of processing by an entity has links to the Philippines (equipment, contract, central management in country, branch /agency, entity holds data in country)

 DATA PRIVACY OFFICER  accountable for ensuring compliance  Manage the privacy aspect in all areas of operation (human resources)  Plan, implement and evaluate programs ( i.e. accountability and transparency) for data privacy, security  PERSONAL INFORMATION CONTROLLERS  Protocol, design for data collection,  Policy and procedure for data subjects to exercise their rights  Access management policy  Procedures to limit, monitor, remedies for breach, disposal of records  Contracts with third parties; quality management program  Guidelines for physical security, technical security

Principles for Data sharing (RA 10173)  Data sharing or further processing of personal data  Specifically provided for by law or allowed  Data subject consents to the data sharing  Data sharing for commercial purpose covered by an agreement  Data subject be provided with the following information ( identity of all controllers, purpose, categories, intended recipients, rights of subject, other info)  Further processing adhere to data privacy act principles  Data sharing agreement should be comprehensive enough  Agreement shall be subject for review by Commission  Other cases allowed by the Commission

GSMA Privacy Design Guidelines for Mobile Applications

 WHY LOCATION DATA PRIVACY MANAGEMENT IS CHALLENGING Growing Complexity:  Access  Technology  Business models  Data Uniquely Sensitive :  Inference  Completeness  Hidden Details Legal Differences :  Unclear precedence & similarities  (Location forum-location data privacy guidelines)

 FURTHER CHALLENGES  Device (new technologies, artificial intelligence)  Man to Machine  Machine to Machine  ACCURACY, INTEGRITY, COMPETENT AUTHORITY

END OF PRESENTATION thank you