E-Privacy for Electronic Commerce Implementing E-Privacy - An Enterprise Approach Tony LAM Deputy Privacy Commissioner for Personal Data, Hong Kong SAR.

Slides:



Advertisements
Similar presentations
Mobile Payments and the FTC Manas Mohapatra Director of Mobile Policy Mobile Technology Unit Federal Trade Commission The views expressed are not necessarily.
Advertisements

E-Commerce and the Law Section Understanding Business and Personal Law E-Commerce and the Law Section 13.3 Contracts for the Sale of Goods Electronic.
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
CHAPTER 4 E-ENVIRONMENT
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
The Internet industry’s privacy seal program Silicon Valley Web Guild.
6/1/2015MINISTRY OF ENERGY, COMMUNICATIONS AND MULTIMEDIA 1 PRESENTATION OF PERSONAL DATA PROTECTION BILL PRESENTATION OF PERSONAL DATA PROTECTION BILL.
Hong Kong Privacy Code on Human Resource Management
Data Protection and Records Management
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
Per Anders Eriksson
Personal Data Privacy and The Internet by Stephen Lau Privacy Commissioner for Personal Data, Hong Kong SAR at the Joint Conference of the OECD, HCOPIL,
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Personal Data (Privacy) Ordinance Hong Kong Personal Data (Privacy) Ordinance Hong Kong by Stephen Lau Privacy Commissioner for Personal Data Hong Kong.
Protecting information rights –­ advancing information policy Privacy law reform for APP entities (organisations)
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
E-Commerce and the Law Section Understanding Business and Personal Law E-Commerce and the Law Section 13.3 Contracts for the Sale of Goods What.
Legal Audits for E-Commerce Copyright (c) 2000 Montana Law Review Montana Law Review Winter, Mont. L. Rev. 77 by Richard C. Bulman, Jr., Esq. and.
Chapter 5 E-environment
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
13 July 2006Susan Joseph Health Privacy It’s My Business Health Records Act 2001 (Vic) eReferral Service Co-ordination System.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Marketing of Information Security Products. The business case for Information Security Management.
Finance and Governance Workshop Data Protection and Information Management 10 June 2014.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Notes for Discussion on a Privacy Practice © Joe Cleetus.
Information Sharing Sheila Logan Information Commissioner’s Office Employability Partnership Event Glasgow 13 August 2009.
1 Office of the Privacy Commissioner for Personal Data Hong Kong SAR Tony LAM Deputy Privacy Commissioner for Personal Data Asian Personal Data Privacy.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Secure e-Business Chartered Accountants of Canada Comptables agréés du Canada Overview of WebTrust TM.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
CHAPTER 8 Consumer Relations.
CHAPTER 17 INTERNATIONAL MARKETING IN E-COMMERCE.
Malcolm Crompton APEC Information Privacy Framework: review, impact, & progress APEC Symposium on Information Privacy Protection in E Government & E Commerce.
Session 7 Compliance failure policy. 1 Contents Part 1: COLP and COFA duties Part 2: What do we have to comply with and why does it matter? Part 3: Compliance.
1 Office of the Privacy Commissioner for Personal Data Hong Kong SAR Tony LAM Deputy Privacy Commissioner for Personal Data Briefing to Asian Data Privacy.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Privacy Advisory Services … … A Best Practices, Integrated Approach Insert Firm Name Here.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
TOPIC:Topic 4: Marketing LESSON TITLE:E-commerce LEARNING INTENTION: To understand e-commerce as a business practice COMPETENCY FOCUS: Creativity: learners.
 List as many websites as you can think of  E-commerce is short for ‘electronic commerce’  It means buying and selling goods using the Internet.
An NZFFBS Training Module.  Objective 1  State the purpose and principles of the Privacy Act and the Code of Ethics.  Objective 2  Apply the principles.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Understanding Privacy An Overview of our Responsibilities.
Consumer Information Federal Trade Commission Act grants Federal Trade Commission (FTC) responsibility regarding unfair methods of competition and unfair.
Understanding Privacy An Overview of our Responsibilities.
Presented by: David Reid, DBA International
Privacy principles Individual written policies
MIGRATING TO NEW TECHNOLOGY
APP entities (organisations)
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
PRIVACY PRESENTATION TO THE SPRING 2013 CONFERENCE BY HANK MOORLAG
Managing Privacy Risk in Your Commercial Practices
Presentation transcript:

E-Privacy for Electronic Commerce Implementing E-Privacy - An Enterprise Approach Tony LAM Deputy Privacy Commissioner for Personal Data, Hong Kong SAR Conference on E-Privacy in the New Economy March 26,

Why the concern about E-Privacy It’s a core value of an organisation in any E- Business initiative “It is not whether an organisation can afford to adopt an E-Privacy policy, but whether it can afford not to do so” 2

E-Privacy : A Business issue How can organisations improve key processes in an increasingly competitive environment? How can organisations maximise the benefit of information in the new information age? Can E-Commerce maximise its value to consumers and simultaneously retain their trust and confidence? 3

E-Privacy : A Management issue “Failure to deal with privacy issues can present frightening risks to the E-Business enterprise” Loss of competitive advantage Loss to potential business 4

E-Privacy : A Management issue “When the client of a major bank can have $900,000 stolen from his account despite all the protections that are written into the system, it seems that even the biggest companies are vulnerable against the skills of a determined Internet criminal.” Source : South China Morning Post, February Unfavourable publicity Customers walk away 5

E-Privacy : A Management issue “In 1998, a federal jury in the US awarded an identity theft victim $50,000 in actual damages and $4.7 million in punitive damages against a major credit- reporting agency. Jurors found that the company failed to follow reasonable procedures to maximise accuracy and that it, in doing so, willfully defamed the defendant” Source : Privacy Times Magazine, May Other costs of remedy Direct costs of litigation 6

E-Privacy : A Consumer issue “Despite the fact that the majority of the sites collected personal information from the user, only a tiny minority provided a privacy policy that gave users meaningful information about how that data would be used. Sites both in the US and EU fall woefully short of the standards set by international guidelines on data protection” Source : Consumer International Report, 2001 Trust and confidence are not yet the hallmarks of E-Commerce 7

E-Privacy : A Consumer issue “Fewer than 2% of all respondents have bought goods or services or traded securities online. The main reason cited by respondents for not using the Internet to shop or trade was concern about security” Source : Census & Statistics Department Survey, 2000 “Of all the respondents, about 52% gave a rating of 8 or more on a scale of 0 to 10 to indicate their privacy concern about purchasing online. The highest privacy concern was “money loss due to interception of your credit card (84%), followed by “misuse of personal data by third parties (72%)”” Source : PCO Opinion Survey,

E-Privacy : Consumer Concerns n Security threats –Insecure transmission of sensitive data –Unauthorised access, modification of information n Privacy intrusion –Unlawful & unfair collection of personal data –Disclosure of data for fraudulent purposes –Misuse of data for unintended purposes without consent –Unsolicited commercial s 9

E-Privacy : A Regulatory compliance issue E-Privacy data practices should operate on the principle that what is illegal offline is illegal online Hong Kong Privacy Law Personal Data (Privacy) Ordinance International and National Regulation EU Directive on Trans-border Data Flow International Conventions and Codes of Practice 10

Privacy Stories n Real Networks - online software distributor – –Collect musical tastes of users without their knowledge – –TRUSTe announced to review its licence agreement n n DoubleClick - online advertising agency – –Profile users’ browsing habits with data of Abacus, a direct marketing firm it had acquired – –FTC investigation ~ a drop of one-third in its share price n n Toysmart - a toy retailer – –Intended sale of a bankrupt business’ customer database – –Court injunction to prevent the sale taking place 11

E-Privacy : A Policy Framework Stage I E-Privacy Drivers Stage II Strategic Planning Stage III Strategy Implementation Stage IV Pursuit of Excellence 12

E-Privacy : A Policy Framework Stage I E-Privacy Drivers ê Organisation Culture ê Privacy Core Value ê E-Privacy Policy 13

E-Privacy : A Policy Framework Stage II Strategic Planning ê Identify E-Privacy issues ê Formulate strategies ê Privacy Impact Assessment 14

E-Privacy : A Policy Framework Stage III Strategy Implementation ê E-Privacy Policy Statement ê Privacy Enhancing Technology ê Compliance & Audit 15

E-Privacy : A Policy Framework Stage IV Pursuit of Excellence ê Manage & Review ê Enhance Compliance ê Continuous Improvement 16

E-Privacy Policy Statement Privacy policies and accurate public statements outlining such policies are a vital step towards encouraging openness and trust in E- Commerce among consumers “They can help consumers to make informed choices about entrusting an organisation with personal data and doing business with it” 17

Core elements of an E-PPS n General statement of personal data policy –your overall commitment to protecting the privacy interests of your consumers n Statement of data handling practices –the kind of personal data held –main purposes for which personal data are used n Notice of other practices –data disclosure practice –data retention and security policy –choice & consent in Internet marketing 18

Making an Effective E-PPS Whenever a web site collects personal data of consumers A prominent “hotlink” from the home page A linked page from any data collection forms Written in simple and easy to understand manner Conforming with acceptable privacy standards Relevant to the online environment of the site Reflecting the core values of privacy protection Avoid “over-commitment” and “under-delivery” 19

E-Privacy : The Pay-off n Building trust & confidence in the E-Economy n Gaining competitive advantage n Enhancing corporate governance 20

Contacting PCO n Hotline n Internet - n - n Correspondence - Unit 2001, 20/floor, Office Tower, Convention Plaza, 1 Harbour Road Wanchai Hong Kong 21