Presentation is loading. Please wait.

Presentation is loading. Please wait.

UAS PRIVACY AND SECURITY.

Similar presentations


Presentation on theme: "UAS PRIVACY AND SECURITY."— Presentation transcript:

1 UAS PRIVACY AND SECURITY

2 INDIAN INSTITUTE OF DRONES
ABOUT US INDIAN INSTITUTE OF DRONES IT IS OUR INTENTION AND AIM TO OFFER THE SKILL SET REQUIREMENTS THAT TICK THE DGCA BOXES AS WELL AS DELIVERING COURSES THAT ARE INSIGHTFUL, FUN AND ABOVE ALL EXTEND THE SUPERIOR SAFETY AND SECURITY RECORD THAT THE INDIAN AVIATION INDUSTRY ENJOYS. AT IIOD TRAINING WILL BE CARRIED OUT BY HIGHLY QUALIFIED PROFESSIONALS WHO NOT ONLY HAVE UNMANNED FLYING EXPERIENCE BUT ALSO HAVE MANNED FLYING EXPERIENCE GIVING THE LEARNERS AN IN-DEPTH KNOWLEDGE OF BOTH MANNED AND UNMANNED FLYING AND HOW THE TWO ARE TO BE SAFELY MERGED TOGETHER. PARA 8 OF DRAFT REGULATIONS

3 INDIAN INSTITUTE OF DRONES
ABOUT US INDIAN INSTITUTE OF DRONES COURSES OFFERED UAV OPERATORS CERTIFICATE – UAV OC(WITH PPL) DURATION: 36 DAYS (APPROX.) UAV OPERATORS CERTIFICATE – UAV OC(WITHOUT PPL) DURATION: 24 DAYS (APPROX.) TYPE TRAINING COURSE – UAV TTC ​ DURATION: 6 DAYS (APPROX.) ​​UAS ORIENTATION COURSE– UAS OC DURATION: 12 HOURS (APPROX.) AERIAL PHOTOGRAPHY COURSE MANUFACTURER TYPE TRAINING ASSESSMENT 2 HOURS(APPROX)

4 ABOUT US FIND US ADDRESS Indian Institute of Drones
WP-11, C-Block, Sector - 71 Noida, Uttar Pradesh CO-ORDINATES Tel no.: Mob no.: /   id:

5 INTRODUCTION THERE HAS BEEN SIGNIFICANT INTEREST IN THE TECHNOLOGY AND PRIVACY ISSUES ASSOCIATED WITH UNMANNED AERIAL VEHICLES (UAVS). THIS CONCERN IS WITH GOOD REASON: IN THE CONTEXT OF VIDEO SURVEILLANCE AND THE CAPABILITIES OF THIS SYSTEM. UAVS PRESENT UNIQUE CHALLENGES, DUE TO THEIR ABILITY TO USE A VARIETY OF SENSORS TO GATHER INFORMATION FROM UNIQUE VANTAGE POINTS – OFTEN FOR LONG PERIODS AND ON A CONTINUOUS BASIS. THE PROSPECT OF HAVING OUR EVERY MOVE MONITORED, AND POSSIBLY RECORDED, RAISES PROFOUND FREEDOM OF MOVEMENT AND PRIVACY CONCERNS. AT THE SAME TIME, THERE ARE MANY DESIRABLE BENEFITS ASSOCIATED WITH THESE TECHNOLOGIES.

6 AIM WE ARE HERE TODAY TO DISCUSS THE USE OF THIS TECHNOLOGY IN THE CIVILIAN CONTEXT WHILE SAFEGUARDING THE INTERESTS NOT ONLY OF THE NATION BUT ALSO OF THE INDIVIDUALS. FOR EASE OF WORKING LETS SPLIT OUR DISCUSSION INTO THREE PARTS. PHYSICAL SECURITY OF THE NATION VIS A VIS USE OF UAV’S. INFORMATION SECURITY OF DATA COLLECTED BY THE USE OF THIS TECHNOLOGY, HOW DATA IS TO BE HANDLED, HOW DATA IS TO BE DISPOSED AND LAST BUT NOT THE LEAST WHO IS RESPONSIBLE. INDIVIDUAL PRIVACY LET US TALK ABOUT HOW THE PRIVACY OF INDIVIDUALS IS AFFECTED USING THIS TECHNOLOGY AND HOW THAT CAN BE SAFEGUARDED.

7 PHYSICAL SECURITY ACCESS COMMON ACCESS TO ALL AND SUNDRY
MISUSE THE EASE OF ACCESS CAN BE MISUSED PREVENTION VARIOUS METHODS USED TRAINING IMPORTANCE OF TRAINING LICENSING NEED AND IMPORTANCE SECURITY CLEARANCE UNDERSTANDING AUTHORITY WHO WILL PREVENT

8 SECURITY OF INFORMATION
CURRENT SYSTEMS USED STORE DATA ON THEIR ONLINE PLATFORMS WHICH GIVES ACCESS TO THE PROVIDER TYPES OF DATA OPTICAL INFRARED ELECTRONIC AUDIO RF LOCATION SECURITY OF DATA BIGGEST CHALLENGE DISPOSAL OF DATA PROCEDURE ACCESS TO DATA WHO, WHERE, WHEN AND HOW

9 INDIVIDUAL PRIVACY WHERE TO LOOK WHO TO LOOK AT
WHAT TO RECORD AND STORE. AUDIT INSPECTION

10 ROLE OF IIOD AWARENESS TRAINING LICENSING LIMITATIONS UIN
SAFETY AND SECURITY

11 THANK YOU


Download ppt "UAS PRIVACY AND SECURITY."

Similar presentations


Ads by Google