SlideShare une entreprise Scribd logo
1  sur  42
Télécharger pour lire hors ligne
www.emiratesid.ae©2013EmiratesIdentityAuthority.Allrightsreserved
P a r t n e r s i n B u i l d i n g U A E ' s S e c u r i t y & E c o n o m y
Our Vision: Provide an integrated and advanced personal identity management system that
contribute to the transformation of the government and the economy and promotes security
and global competitiveness of the UAE.
Privacy & Data Protection
Presented by Dr. Ali M. Al-Khouri
In: 2nd Annual Gulf Cooperation Council e-Participation & e-Governance
Forum – Organised by: Abu Dhabi University Knowledge Group and UAE
Telecommunications Regulatory Authority.
9 – 11 September 2013 | Dusit Thani Hotel | Abu Dhabi | UAE.
Keynote Address
in the Digital World
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved 9/3/2013 3
• Introduction
• What is Data Privacy? Why Do We Need Data Protection?
• Data Privacy Laws & Practices
• Data Privacy in UAE
• Government Role in Data and Privacy Protection
• Concluding Remarks
Agenda
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved 9/6/2013 4
Agenda
• Introduction
• What is Data Privacy? Why Do We Need Data Protection?
• Data Privacy Laws & Practices
• Data Privacy in UAE
• Government Role in Data and Privacy Protection
• Concluding Remarks
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• Explosive growth of
computers & information
technology ..
• Impact?
• Opportunities, challenges
and problems ..
• Data/Information Age?
Introduction
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
every day, we create
2.5 quintillion bytes of data
2,500,000,000,000,000,000!
Data Explosion?
of the data in the world today
has been created in the last two
years!
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Expectations of Privacy but Compromising
Technologies
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved 9/6/2013 8
Agenda
• Introduction
• What is Data Privacy? Why Do We Need Data Protection?
• Data Privacy Laws & Practices
• Data Privacy in UAE
• Government Role in Data and Privacy Protection
• Concluding Remarks
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Privacy? A Matter of Perceptions and Expectation
What does it
really mean?
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Privacy? A Matter of Perceptions and Expectation
Ability to control the dissemination and
use of one’s personal information?
What does it
really mean?
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Data Privacy?
9/4/2013 11
.. deals with the relationship
between collection and
dissemination of personal
information ..
.. that can lead to identification
and private details of a person.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Data Privacy?
9/5/2013 12
.. deals with the relationship
between collection and
dissemination of personal
information ..
.. that can lead to identification
and private details of a person.
Our digital interactions leave a
huge trail of data leaving
behind bits and pieces of us
with pointers to our real
behaviour.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
What is Data Privacy?
9/5/2013 13
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
What is Data Privacy?
9/5/2013 14
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Roles of Entities in Data Protection
9/3/2013 15
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Roles of Entities in Data Protection
9/3/2013 16
… generally, a legal entity that regulates data collection, storage
and transmission and acts to provide necessary protection to data
provider ensuring the agreed-levels privacy.
.. “authorized”
entity to collect
personal data &
compile personal
information
.. entity who willfully
provides data to
data collector.
.. entity who
transmits data to
other collectors or
users of the data
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Roles of Entities in Data Protection
9/8/2013 17
.. though may not be mandatory in many countries to be a
specific entity, the responsibility of providing data protection
lies with service providers and law institutions like the courts
could provide required legal protection.
e.g., banks, credit
card companies,
health providers,
insurance
provider,
government,
service providers,
retailers etc…
e.g., Internet service
providers, telecom
providers, mobile
service providers,
internal networks,
etc.
e.g., credit bureau,
trust centres, etc.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• interactions, transactions, communications, sought to be
analyzed for bringing commercial entities closer to the psyche
of the individual (knowing customers –personalising services and
products).
Digital Behaviour and Identity Construction?
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Why Data is important?
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
“Data-driven innovation,” will help to
create 4.4 million information technology
(IT) jobs globally by 2015, including 1.9
million in the United States (US)
Big data has potential to create massive saving and revenues in
all sectors:
• create $300 billion in potential annual value to U.S. healthcare;
• €250 billion potential annual value to Europe’s public sector
administration; and
• $600 billion in potential annual consumer surplus from using
personal location data globally.
Value and Opportunities?
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved 9/6/2013 21
Agenda
• Introduction
• What is Data Privacy? Why Do We Need Data Protection?
• Data Privacy Laws & Practices
• Data Privacy in UAE
• Government Role in Data and Privacy Protection
• Concluding Remarks
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Data Protection: Global Practices
9/3/2013 24
The heat map here depicts the global trends of privacy and
adequacy of data protection provisions in the world.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Parameters of Categorization
9/3/2013 25
Types of personal data covered in
data privacy legislation
legal obligations
placed on public
and private
organizations
Existence of
legislation
preventing data
transfers with
adequate data
protection
regulation
attainment of EU official Adequacy
standard for data protection & privacy
ability to enforce data
privacy regulations through
an independent agency
Legislative & cultural
barriers limiting
government
surveillance over
communications.
Constitutionally-
backed data privacy
laws.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Data Protection: Global Practices
9/3/2013 26
EU provides highest restriction on data use, and privacy protection
South Korea, highest in East. Middle East prominent in not providing
adequate legislation, with exception to UAE and Qatar.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Governments Enacting Privacy and Protection Laws
9/3/2013 27
.. basis of privacy laws in each of the
EU member states..
enforced and legally binding to
all institutions involved in the
handling of personal information
strongest and the strictest
enactment in the world
.. strong proponent of
privacy protection with
a Federal Privacy act
since 1998
No
specific
laws..
national
security.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved 9/6/2013 28
Agenda
• Introduction
• What is Data Privacy? Why Do We Need Data Protection?
• Data Privacy Laws & Practices
• Data Privacy in UAE
• Government Role in Data and Privacy Protection
• Concluding Remarks
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Data Protection in UAE
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Breaches of privacy
can result in severe
penalties, which
include fines,
incarceration, and
even deportation.
covers web
transactions and
cyber crimes that
seek to protect
individual privacy
Right to Privacy is Constitutional in UAE
data
collection &
transmission
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Breaches of privacy
can result in severe
penalties, which
include fines,
incarceration, and
even deportation.
covers web
transactions and
cyber crimes that
seek to protect
individual privacy
Right to Privacy is Constitutional in UAE
data
collection &
transmission
Personal information privacy is adequately
provided for within the legal framework in UAE.
However, there is no single authority or
entity that constitutes a data privacy protection
or information protection officer.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
“You have
zero privacy.
Get over it.”
Scott McNealy,
CEO, Sun Microsystems.
January 25, 1999
Erosion of Privacy
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved 9/6/2013 34
Agenda
• Introduction
• What is Data Privacy? Why Do We Need Data Protection?
• Data Privacy Laws & Practices
• Data Privacy in UAE
• Government Role in Data and Privacy Protection
• Concluding Remarks
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Modern Identity Management Systems
Intense role of Government
issued personal identity as
unique national ID.. providing
required privacy in anonymity
and yet provide meaningful
data for authentication.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
The Digital Identity provides
the perfect PROXY for the
personal identity.
Personal ID and UAE National ID
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Emirates ID
provide
necessary
credential
verification on
the web
Trust Establishment
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Individual Authentication Service
Provider
Emirates ID
ID card
credentialsremain
anonymous
Digital certificates & biometrics are used to perform
credential verification.
Anonymous Identity
The individuals would be known and authenticated as genuine
persons by the National Identity Authority providing a THIRD
PARTY authentication for the identity.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Individual Authentication Service
Provider
Emirates ID
ID card
credentials
Government do not
share personal data
with servicer providers,
but provide only
credential verification.
(AUTH AS A SERVICE)
Service Providers
Thus, service providers can identify the potential service
seeker securely from the authentication provided by the
Emirates ID Authority.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Individual Authentication Emirates ID
ID card
credentials
Channel Service
Provider
• Internet
• Mobile
• Counter
• IVR
• Etc.
Electronic Channels
Government Identity Management Infrastructure support
different communication platforms
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Individual Authentication Service
Provider
Emirates ID
credentials
An individual will then be able to transact and interact freely
without compromising his/her personal identity.
Anonymous Identity
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
UAE National ID and Privacy
• All data is treated as personally
identifiable and subjected to the
regulatory framework.
• Emirates ID Authority would provide this
regulatory framework to ensure identity
protection.
• Technical and Technology Solutions are
already in place to support the
regulatory and legal framework.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved 9/6/2013 45
Agenda
• Introduction
• What is Data Privacy? Why Do We Need Data Protection?
• Data Privacy Laws & Practices
• Data Privacy in UAE
• Government Role in Data and Privacy Protection
• Concluding Remarks
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Conclusion
Data security and privacy will
remain an issue in light of
evolving technologies and
increasing take-ups.
Although regulation is crucial,
the issue of privacy vs.
legislation will still be a riddle!
chicken and egg conundrum.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Knowledge-based Economy
• Privacy laws: enabler or the
barrier?
• Presence of a dedicated
privacy protection agency.
• Need for more education
programs, to raise
awareness among citizens.
• Enforcement capabilities to
ensure compliance.
• International collaboration.
www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
THANK YOU.
Dr. Ali M. Al-Khouri
Director General | Emirates Identity Authority | UAE
ali.alkhouri@emiratesid.ae | www.emiratesid.ae
Read our recent research from:
http://www.emiratesid.gov.ae/ar/media-center/publications.aspx

Contenu connexe

Tendances

Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPRDipanjanDey12
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theftAmber Gupta
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyThoughtworks
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationVicky Dallas
 

Tendances (20)

Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Data protection
Data protectionData protection
Data protection
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 

Similaire à Privacy & Data Protection in the Digital World

Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
 
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnovCyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnovEric Vanderburg
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in IndiaHome
 
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014UsmanMAmeer
 
Gsma pmp - enhancing data protection and privacy in nigeria through the dat...
Gsma   pmp - enhancing data protection and privacy in nigeria through the dat...Gsma   pmp - enhancing data protection and privacy in nigeria through the dat...
Gsma pmp - enhancing data protection and privacy in nigeria through the dat...Nzeih Chukwuemeka
 
Internet of Things Software SIG
Internet of Things Software SIGInternet of Things Software SIG
Internet of Things Software SIGMohammad Khatib
 
Data Protection Centre Presentation 300123.pptx
Data Protection Centre Presentation 300123.pptxData Protection Centre Presentation 300123.pptx
Data Protection Centre Presentation 300123.pptxDhananjayBhardwaj13
 
Motor City West Presentation - Kimberlin Cranford, Acxiom Corporation
Motor City West Presentation - Kimberlin Cranford, Acxiom CorporationMotor City West Presentation - Kimberlin Cranford, Acxiom Corporation
Motor City West Presentation - Kimberlin Cranford, Acxiom CorporationthinkLA
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
Ensuring Data Security and Privacy: Best Practices for Debt Collection Agenci...
Ensuring Data Security and Privacy: Best Practices for Debt Collection Agenci...Ensuring Data Security and Privacy: Best Practices for Debt Collection Agenci...
Ensuring Data Security and Privacy: Best Practices for Debt Collection Agenci...Cedar Financial
 
Ensuring Data Security and Privacy in California: Best Practices for Debt Col...
Ensuring Data Security and Privacy in California: Best Practices for Debt Col...Ensuring Data Security and Privacy in California: Best Practices for Debt Col...
Ensuring Data Security and Privacy in California: Best Practices for Debt Col...Cedar Financial
 
KSA PDPL - Personal Data Protection Law.pdf
KSA PDPL - Personal Data Protection Law.pdfKSA PDPL - Personal Data Protection Law.pdf
KSA PDPL - Personal Data Protection Law.pdfDaviesParker
 
IRISSCON 2014 Privacy Cloud Computing
IRISSCON 2014 Privacy Cloud ComputingIRISSCON 2014 Privacy Cloud Computing
IRISSCON 2014 Privacy Cloud ComputingPaul Hogan
 

Similaire à Privacy & Data Protection in the Digital World (20)

Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
 
Cyber safe lambeth | GDPR taster
Cyber safe lambeth | GDPR tasterCyber safe lambeth | GDPR taster
Cyber safe lambeth | GDPR taster
 
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnovCyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
 
Homeland Security
Homeland SecurityHomeland Security
Homeland Security
 
Final projet
Final  projetFinal  projet
Final projet
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
 
DATA SOVEREIGHTY IGF.pptx
DATA SOVEREIGHTY IGF.pptxDATA SOVEREIGHTY IGF.pptx
DATA SOVEREIGHTY IGF.pptx
 
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
OVERVIEW OF NIGERIA DATA PROTECTION ACT 2014
 
Federated e-Identity Management across GCC Countries
Federated e-Identity Management across GCC CountriesFederated e-Identity Management across GCC Countries
Federated e-Identity Management across GCC Countries
 
Technology Trends & e-Government
Technology Trends & e-GovernmentTechnology Trends & e-Government
Technology Trends & e-Government
 
Gsma pmp - enhancing data protection and privacy in nigeria through the dat...
Gsma   pmp - enhancing data protection and privacy in nigeria through the dat...Gsma   pmp - enhancing data protection and privacy in nigeria through the dat...
Gsma pmp - enhancing data protection and privacy in nigeria through the dat...
 
Internet of Things Software SIG
Internet of Things Software SIGInternet of Things Software SIG
Internet of Things Software SIG
 
Data Protection Centre Presentation 300123.pptx
Data Protection Centre Presentation 300123.pptxData Protection Centre Presentation 300123.pptx
Data Protection Centre Presentation 300123.pptx
 
Motor City West Presentation - Kimberlin Cranford, Acxiom Corporation
Motor City West Presentation - Kimberlin Cranford, Acxiom CorporationMotor City West Presentation - Kimberlin Cranford, Acxiom Corporation
Motor City West Presentation - Kimberlin Cranford, Acxiom Corporation
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Cloud and Data Privacy
Cloud and Data PrivacyCloud and Data Privacy
Cloud and Data Privacy
 
Ensuring Data Security and Privacy: Best Practices for Debt Collection Agenci...
Ensuring Data Security and Privacy: Best Practices for Debt Collection Agenci...Ensuring Data Security and Privacy: Best Practices for Debt Collection Agenci...
Ensuring Data Security and Privacy: Best Practices for Debt Collection Agenci...
 
Ensuring Data Security and Privacy in California: Best Practices for Debt Col...
Ensuring Data Security and Privacy in California: Best Practices for Debt Col...Ensuring Data Security and Privacy in California: Best Practices for Debt Col...
Ensuring Data Security and Privacy in California: Best Practices for Debt Col...
 
KSA PDPL - Personal Data Protection Law.pdf
KSA PDPL - Personal Data Protection Law.pdfKSA PDPL - Personal Data Protection Law.pdf
KSA PDPL - Personal Data Protection Law.pdf
 
IRISSCON 2014 Privacy Cloud Computing
IRISSCON 2014 Privacy Cloud ComputingIRISSCON 2014 Privacy Cloud Computing
IRISSCON 2014 Privacy Cloud Computing
 

Plus de Arab Federation for Digital Economy

اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربيةاقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربيةArab Federation for Digital Economy
 
المدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةالمدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةArab Federation for Digital Economy
 
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...Arab Federation for Digital Economy
 
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزماتالاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزماتArab Federation for Digital Economy
 
كوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئةكوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئةArab Federation for Digital Economy
 
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجيكيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجيArab Federation for Digital Economy
 
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint ActionReconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint ActionArab Federation for Digital Economy
 
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبةمستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبةArab Federation for Digital Economy
 
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟Arab Federation for Digital Economy
 
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...Arab Federation for Digital Economy
 

Plus de Arab Federation for Digital Economy (20)

اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربيةاقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
 
Foundations of the UAE and GCC Economies with Covid-19
Foundations of the UAE and GCC Economies with Covid-19Foundations of the UAE and GCC Economies with Covid-19
Foundations of the UAE and GCC Economies with Covid-19
 
سلطة العقل
سلطة العقلسلطة العقل
سلطة العقل
 
الحكومة الرقمية: مفاهيم وممارسات
الحكومة الرقمية: مفاهيم وممارساتالحكومة الرقمية: مفاهيم وممارسات
الحكومة الرقمية: مفاهيم وممارسات
 
المدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةالمدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقمية
 
القمة في العمل المؤسسي
القمة في العمل المؤسسيالقمة في العمل المؤسسي
القمة في العمل المؤسسي
 
القمة في العمل المؤسسي
القمة في العمل المؤسسيالقمة في العمل المؤسسي
القمة في العمل المؤسسي
 
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
 
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزماتالاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
 
Digital economy and national security
Digital economy and national securityDigital economy and national security
Digital economy and national security
 
New World Economy
New World EconomyNew World Economy
New World Economy
 
كوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئةكوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئة
 
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجيكيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
 
Digital Economy and Policy Needs for Digital Transformation
Digital Economy and Policy Needs for Digital TransformationDigital Economy and Policy Needs for Digital Transformation
Digital Economy and Policy Needs for Digital Transformation
 
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint ActionReconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
 
Conflicts in Organisations
Conflicts in OrganisationsConflicts in Organisations
Conflicts in Organisations
 
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبةمستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
 
Policy Needs for Digital Economy
Policy Needs for Digital EconomyPolicy Needs for Digital Economy
Policy Needs for Digital Economy
 
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
 
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
 

Dernier

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Dernier (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Privacy & Data Protection in the Digital World

  • 1. www.emiratesid.ae©2013EmiratesIdentityAuthority.Allrightsreserved P a r t n e r s i n B u i l d i n g U A E ' s S e c u r i t y & E c o n o m y Our Vision: Provide an integrated and advanced personal identity management system that contribute to the transformation of the government and the economy and promotes security and global competitiveness of the UAE. Privacy & Data Protection Presented by Dr. Ali M. Al-Khouri In: 2nd Annual Gulf Cooperation Council e-Participation & e-Governance Forum – Organised by: Abu Dhabi University Knowledge Group and UAE Telecommunications Regulatory Authority. 9 – 11 September 2013 | Dusit Thani Hotel | Abu Dhabi | UAE. Keynote Address in the Digital World
  • 2. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved 9/3/2013 3 • Introduction • What is Data Privacy? Why Do We Need Data Protection? • Data Privacy Laws & Practices • Data Privacy in UAE • Government Role in Data and Privacy Protection • Concluding Remarks Agenda
  • 3. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved 9/6/2013 4 Agenda • Introduction • What is Data Privacy? Why Do We Need Data Protection? • Data Privacy Laws & Practices • Data Privacy in UAE • Government Role in Data and Privacy Protection • Concluding Remarks
  • 4. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved • Explosive growth of computers & information technology .. • Impact? • Opportunities, challenges and problems .. • Data/Information Age? Introduction
  • 5. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved every day, we create 2.5 quintillion bytes of data 2,500,000,000,000,000,000! Data Explosion? of the data in the world today has been created in the last two years!
  • 6. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Expectations of Privacy but Compromising Technologies
  • 7. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved 9/6/2013 8 Agenda • Introduction • What is Data Privacy? Why Do We Need Data Protection? • Data Privacy Laws & Practices • Data Privacy in UAE • Government Role in Data and Privacy Protection • Concluding Remarks
  • 8. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Privacy? A Matter of Perceptions and Expectation What does it really mean?
  • 9. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Privacy? A Matter of Perceptions and Expectation Ability to control the dissemination and use of one’s personal information? What does it really mean?
  • 10. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Data Privacy? 9/4/2013 11 .. deals with the relationship between collection and dissemination of personal information .. .. that can lead to identification and private details of a person.
  • 11. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Data Privacy? 9/5/2013 12 .. deals with the relationship between collection and dissemination of personal information .. .. that can lead to identification and private details of a person. Our digital interactions leave a huge trail of data leaving behind bits and pieces of us with pointers to our real behaviour.
  • 12. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved What is Data Privacy? 9/5/2013 13
  • 13. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved What is Data Privacy? 9/5/2013 14
  • 14. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Roles of Entities in Data Protection 9/3/2013 15
  • 15. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Roles of Entities in Data Protection 9/3/2013 16 … generally, a legal entity that regulates data collection, storage and transmission and acts to provide necessary protection to data provider ensuring the agreed-levels privacy. .. “authorized” entity to collect personal data & compile personal information .. entity who willfully provides data to data collector. .. entity who transmits data to other collectors or users of the data
  • 16. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Roles of Entities in Data Protection 9/8/2013 17 .. though may not be mandatory in many countries to be a specific entity, the responsibility of providing data protection lies with service providers and law institutions like the courts could provide required legal protection. e.g., banks, credit card companies, health providers, insurance provider, government, service providers, retailers etc… e.g., Internet service providers, telecom providers, mobile service providers, internal networks, etc. e.g., credit bureau, trust centres, etc.
  • 17. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved • interactions, transactions, communications, sought to be analyzed for bringing commercial entities closer to the psyche of the individual (knowing customers –personalising services and products). Digital Behaviour and Identity Construction?
  • 18. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Why Data is important?
  • 19. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved “Data-driven innovation,” will help to create 4.4 million information technology (IT) jobs globally by 2015, including 1.9 million in the United States (US) Big data has potential to create massive saving and revenues in all sectors: • create $300 billion in potential annual value to U.S. healthcare; • €250 billion potential annual value to Europe’s public sector administration; and • $600 billion in potential annual consumer surplus from using personal location data globally. Value and Opportunities?
  • 20. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved 9/6/2013 21 Agenda • Introduction • What is Data Privacy? Why Do We Need Data Protection? • Data Privacy Laws & Practices • Data Privacy in UAE • Government Role in Data and Privacy Protection • Concluding Remarks
  • 21. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Data Protection: Global Practices 9/3/2013 24 The heat map here depicts the global trends of privacy and adequacy of data protection provisions in the world.
  • 22. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Parameters of Categorization 9/3/2013 25 Types of personal data covered in data privacy legislation legal obligations placed on public and private organizations Existence of legislation preventing data transfers with adequate data protection regulation attainment of EU official Adequacy standard for data protection & privacy ability to enforce data privacy regulations through an independent agency Legislative & cultural barriers limiting government surveillance over communications. Constitutionally- backed data privacy laws.
  • 23. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Data Protection: Global Practices 9/3/2013 26 EU provides highest restriction on data use, and privacy protection South Korea, highest in East. Middle East prominent in not providing adequate legislation, with exception to UAE and Qatar.
  • 24. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Governments Enacting Privacy and Protection Laws 9/3/2013 27 .. basis of privacy laws in each of the EU member states.. enforced and legally binding to all institutions involved in the handling of personal information strongest and the strictest enactment in the world .. strong proponent of privacy protection with a Federal Privacy act since 1998 No specific laws.. national security.
  • 25. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved 9/6/2013 28 Agenda • Introduction • What is Data Privacy? Why Do We Need Data Protection? • Data Privacy Laws & Practices • Data Privacy in UAE • Government Role in Data and Privacy Protection • Concluding Remarks
  • 26. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Data Protection in UAE
  • 27. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Breaches of privacy can result in severe penalties, which include fines, incarceration, and even deportation. covers web transactions and cyber crimes that seek to protect individual privacy Right to Privacy is Constitutional in UAE data collection & transmission
  • 28. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Breaches of privacy can result in severe penalties, which include fines, incarceration, and even deportation. covers web transactions and cyber crimes that seek to protect individual privacy Right to Privacy is Constitutional in UAE data collection & transmission Personal information privacy is adequately provided for within the legal framework in UAE. However, there is no single authority or entity that constitutes a data privacy protection or information protection officer.
  • 29. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved “You have zero privacy. Get over it.” Scott McNealy, CEO, Sun Microsystems. January 25, 1999 Erosion of Privacy
  • 30. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved 9/6/2013 34 Agenda • Introduction • What is Data Privacy? Why Do We Need Data Protection? • Data Privacy Laws & Practices • Data Privacy in UAE • Government Role in Data and Privacy Protection • Concluding Remarks
  • 31. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Modern Identity Management Systems Intense role of Government issued personal identity as unique national ID.. providing required privacy in anonymity and yet provide meaningful data for authentication.
  • 32. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved The Digital Identity provides the perfect PROXY for the personal identity. Personal ID and UAE National ID
  • 33. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Emirates ID provide necessary credential verification on the web Trust Establishment
  • 34. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Individual Authentication Service Provider Emirates ID ID card credentialsremain anonymous Digital certificates & biometrics are used to perform credential verification. Anonymous Identity The individuals would be known and authenticated as genuine persons by the National Identity Authority providing a THIRD PARTY authentication for the identity.
  • 35. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Individual Authentication Service Provider Emirates ID ID card credentials Government do not share personal data with servicer providers, but provide only credential verification. (AUTH AS A SERVICE) Service Providers Thus, service providers can identify the potential service seeker securely from the authentication provided by the Emirates ID Authority.
  • 36. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Individual Authentication Emirates ID ID card credentials Channel Service Provider • Internet • Mobile • Counter • IVR • Etc. Electronic Channels Government Identity Management Infrastructure support different communication platforms
  • 37. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Individual Authentication Service Provider Emirates ID credentials An individual will then be able to transact and interact freely without compromising his/her personal identity. Anonymous Identity
  • 38. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved UAE National ID and Privacy • All data is treated as personally identifiable and subjected to the regulatory framework. • Emirates ID Authority would provide this regulatory framework to ensure identity protection. • Technical and Technology Solutions are already in place to support the regulatory and legal framework.
  • 39. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved 9/6/2013 45 Agenda • Introduction • What is Data Privacy? Why Do We Need Data Protection? • Data Privacy Laws & Practices • Data Privacy in UAE • Government Role in Data and Privacy Protection • Concluding Remarks
  • 40. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Conclusion Data security and privacy will remain an issue in light of evolving technologies and increasing take-ups. Although regulation is crucial, the issue of privacy vs. legislation will still be a riddle! chicken and egg conundrum.
  • 41. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved Knowledge-based Economy • Privacy laws: enabler or the barrier? • Presence of a dedicated privacy protection agency. • Need for more education programs, to raise awareness among citizens. • Enforcement capabilities to ensure compliance. • International collaboration.
  • 42. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved THANK YOU. Dr. Ali M. Al-Khouri Director General | Emirates Identity Authority | UAE ali.alkhouri@emiratesid.ae | www.emiratesid.ae Read our recent research from: http://www.emiratesid.gov.ae/ar/media-center/publications.aspx