SlideShare une entreprise Scribd logo
1  sur  13
The Internet of Things – Automatski Corp.
http://www.automatski.com
E: Aditya@automatski.com , Founder & CEO
M:+91-9986574181
E: Shubhadeep.dev@automatski.com , Director - Sales
M: +91-8884074204
 Automatski is an IoT pioneer in many ways…
 With its ground up first principles based IoT Scale Platform
 With Infinions.io
 Autonomous Compute Platform ®
 Autonomous Machine Consumption Certified ®
 But Analyst count more than 180 IoT Platforms across the world
 An IoT Platform is a tough sell, even if you are cutting edge
 Hence we want to eliminate one more possibility of someone choosing others over us.
 The IoT Industry is filled with Paranoia about Security & Privacy concerns
 Hence we want to address Security and Privacy even within the foundations and early
stages of our Architecture and Existence as a Business
 That’s why we are doing this!
 Automatski is a front runner in addressing IoT Security & Privacy concerns, using
a combination of
 Research
 Standard Industry Practices
 Software Engineering Principles
 Operational Excellence
 Information technology - Security techniques - Code of practice for protection of
personally identifiable information (PII) in public clouds acting as PII processors
 This standard provides guidance aimed at ensuring that cloud service providers
(such as Amazon and Google) offer suitable information security controls to
protect the privacy of their customers’ clients by securing PII (Personally
Identifiable Information) entrusted to them.
 The Standard contains sets of controls that are intended to be implemented by cloud
service providers to ensure security. The Standard sets out controls including (amongst
others):
 information security policies;
 human resource security;
 access control;
 cryptography;
 physical and environmental security;
 operations security;
 communications security;
 supplier relationships;
 information security incident management;
 information security aspects of business continuity management; and
 compliance.
*** Not Legally Binding!
 Establishes controls over what personal information is collected, maintained, used
and disseminated by agencies in the executive branch of the Federal government.
 The Privacy Act only applies to records that are located in a “system of records.”
As defined in the Privacy Act, a system of records is “a group of any records under
the control of any agency from which information is retrieved by the name of the
individual or by some identifying number, symbol, or other identifying particular
assigned to the individual.”
 The Privacy Act guarantees three primary rights:
 The right to see records about oneself, subject to Privacy Act exemptions;
 The right to request the amendment of records that are not accurate, relevant, timely or
complete; and
 The right of individuals to be protected against unwarranted invasion of their privacy
resulting from the collection, maintenance, use, and disclosure of personal information.
 In January of this year the European Commission revealed a draft of its European
Data Protection Regulation to replace the previous Data Protection Directive.
 The Data Protection Directive is a European Union Directive, which was created
to regulate the progression of personal data within the European Union. Officially
known as the Directive 95/46/EC the legislation is part of the EU privacy and
human rights law.
 The aim of the new European Data Protection Regulation is to harmonise the
current data protection laws in place across the EU member states. The fact that
it is a “regulation” instead of a “directive” means it will be directly applicable to all
EU member states without a need for national implementing legislation.
1. Get your privacy policies, procedures and documentation in order and keep
them up to date: data protection authorities will be able to ask for these at any
time.
2. Form a governance group that oversees all your privacy activities, led by a
senior manager or executive. If you have over 250 employees, appoint a data
protection officer. The group should develop metrics to measure the status of
privacy efforts, report regularly and create statements of compliance that will
be required as part of your organization's annual report.
3. Implement a breach notification process and enhance your incident
management processes and your detection and response capabilities. Any data
breach must be notified to the relevant data protection authority, even if
protective measures, such as encryption, are in place; or the likelihood of harm
is low.
4. Prepare your organisation to fulfil the "right to be forgotten", "right to erasure"
and the "right to data portability". A strategy covering topics such as data
classification, retention, collection, destruction, storage and search will be
required – and it should cover all mechanisms by which data is collected,
including the internet, call centres and paper.
5. Create and enforce privacy throughout your systems' lifecycles to meet the
"privacy by design" requirement, whether you buy or develop. This will ensure
privacy controls are stronger, simpler to implement, harder to by-pass and
totally embedded in a system’s core functionality.
2015
•3rd Product
Release
•Privacy Act 1974
Compliance
2016
•4th/5th Product
Release
•ISO/IEC 27018
•EU Data
Protection
Regulation
 10-20+ years of Software Engineering experience each
 Global Agile & Technology Consulting, Advisory & Delivery experience of 10-15+ years since Agile and Tech was in
Infancy.
 The first computers we worked on were Atari and ZX Spectrum ;-) And yes after Basic we went to C/C++ and then
straight to Assembly Programming and then -> we began our journey as technologists
 Globally Distributed Global & Fortune Company work Experience
 Worked with companies like BCG, McKinsey, Fidelity, Tesco, Goldman Sachs…
 Long 3-5+ year projects & Over 200+ people globally distributed teams
 Led Double Digit Multi-Billion US$ Projects
 Blended methodology used comprising of Scrum, XP, Lean and Kanban
 From there we rode every wave J2EE, RUP, Six Sigma, CMMI, SIP, Mobile, Cloud, Big Data, Data Science etc…
 Individually worked with over 300+ Technologies at a time, literally nothing that scares us 
 Authors, Speakers, Coach’s, Mentors, Scientists, Engineers, Technologists, Marketing, Sales, HR, Finance…
 We are Generalists and we Always start with First Principles.
 Please refer to http://automatski.com for more information
 Please go through the 2 minute demo, 5 minute demo…
 And the showcase section of the website for more information…
 Or email us on aditya@automatski.com
 Or just give us a shout on Linkedin, Facebook, Twitter, Email etc.

Contenu connexe

Tendances

Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftMind the Byte
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
Cs8792 cns - unit i
Cs8792   cns - unit iCs8792   cns - unit i
Cs8792 cns - unit iArthyR3
 
Prevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationPrevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationSophos Benelux
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementKeelan Stewart
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Praveenkumar Hosangadi
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debateDavid Strom
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacySolix Technologies, Inc
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...IT Governance Ltd
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines Skyhigh Networks
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...IT Governance Ltd
 
101 Basic concepts of information security
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information securitySsendiSamuel
 

Tendances (20)

Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
Cs8792 cns - unit i
Cs8792   cns - unit iCs8792   cns - unit i
Cs8792 cns - unit i
 
Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
 
Data protection
Data protectionData protection
Data protection
 
Prevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data RegulationPrevent million dollar fines - preparing for the EU General Data Regulation
Prevent million dollar fines - preparing for the EU General Data Regulation
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
Infosec Law (Feb 2006)
Infosec Law (Feb 2006)Infosec Law (Feb 2006)
Infosec Law (Feb 2006)
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Privacy by Design
Privacy by DesignPrivacy by Design
Privacy by Design
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
 
101 Basic concepts of information security
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information security
 

En vedette

Ict Expo Data Privacy Global Issues & Trends
Ict Expo Data Privacy Global Issues & TrendsIct Expo Data Privacy Global Issues & Trends
Ict Expo Data Privacy Global Issues & TrendsCharles Mok
 
Addressing Data Privacy Challenges In Global Applications
Addressing Data Privacy Challenges In Global ApplicationsAddressing Data Privacy Challenges In Global Applications
Addressing Data Privacy Challenges In Global ApplicationsSambit Banerjee
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)FFRI, Inc.
 
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)jasonlan
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-CommerceJitendra Tomar
 

En vedette (7)

Ict Expo Data Privacy Global Issues & Trends
Ict Expo Data Privacy Global Issues & TrendsIct Expo Data Privacy Global Issues & Trends
Ict Expo Data Privacy Global Issues & Trends
 
Gerimaks putilina
Gerimaks putilinaGerimaks putilina
Gerimaks putilina
 
Addressing Data Privacy Challenges In Global Applications
Addressing Data Privacy Challenges In Global ApplicationsAddressing Data Privacy Challenges In Global Applications
Addressing Data Privacy Challenges In Global Applications
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
 
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 

Similaire à Automatski - The Internet of Things - Privacy Standards

Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfEnov8
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpJason Lackey
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRIryna Chekanava
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRShadi A. Razak
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowSymantec
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniquesUlf Mattsson
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To ConsiderSymantec
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?Cigniti Technologies Ltd
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliancePeter Goldbrunner
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 

Similaire à Automatski - The Internet of Things - Privacy Standards (20)

Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
PREPARING FOR THE GDPR
PREPARING FOR THE GDPRPREPARING FOR THE GDPR
PREPARING FOR THE GDPR
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 

Plus de automatskicorporation

Automatski - Audio Video Conferencing
Automatski  - Audio Video ConferencingAutomatski  - Audio Video Conferencing
Automatski - Audio Video Conferencingautomatskicorporation
 
Automatski - Asset Management Solution
Automatski - Asset Management SolutionAutomatski - Asset Management Solution
Automatski - Asset Management Solutionautomatskicorporation
 
Automatski - Fleet Management Solution
Automatski - Fleet Management SolutionAutomatski - Fleet Management Solution
Automatski - Fleet Management Solutionautomatskicorporation
 
Automatski - Smart Building Solution
Automatski - Smart Building SolutionAutomatski - Smart Building Solution
Automatski - Smart Building Solutionautomatskicorporation
 
Automatski - Remote Patient Management Solution
Automatski - Remote Patient Management SolutionAutomatski - Remote Patient Management Solution
Automatski - Remote Patient Management Solutionautomatskicorporation
 
Automatski - Industrial Process Monitoring Solution
Automatski - Industrial Process Monitoring SolutionAutomatski - Industrial Process Monitoring Solution
Automatski - Industrial Process Monitoring Solutionautomatskicorporation
 
Automatski - The Internet of Things - Massively Distributed Realtime Machine ...
Automatski - The Internet of Things - Massively Distributed Realtime Machine ...Automatski - The Internet of Things - Massively Distributed Realtime Machine ...
Automatski - The Internet of Things - Massively Distributed Realtime Machine ...automatskicorporation
 
Automatski - The Internet of Things - AutoSIM
Automatski - The Internet of Things - AutoSIMAutomatski - The Internet of Things - AutoSIM
Automatski - The Internet of Things - AutoSIMautomatskicorporation
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTautomatskicorporation
 

Plus de automatskicorporation (20)

Automatski - Physical Web
Automatski - Physical WebAutomatski - Physical Web
Automatski - Physical Web
 
Automatski - Beacon Management
Automatski  - Beacon ManagementAutomatski  - Beacon Management
Automatski - Beacon Management
 
Automatski - Open City
Automatski - Open CityAutomatski - Open City
Automatski - Open City
 
Automatski - Public WiFi
Automatski - Public WiFiAutomatski - Public WiFi
Automatski - Public WiFi
 
Automatski - Audio Video Conferencing
Automatski  - Audio Video ConferencingAutomatski  - Audio Video Conferencing
Automatski - Audio Video Conferencing
 
Automatski - Video Surveillance
Automatski - Video SurveillanceAutomatski - Video Surveillance
Automatski - Video Surveillance
 
Automatski - Digital Signage
Automatski - Digital SignageAutomatski - Digital Signage
Automatski - Digital Signage
 
Automatski - Invoicing & Payments
Automatski - Invoicing & PaymentsAutomatski - Invoicing & Payments
Automatski - Invoicing & Payments
 
Automatski - Asset Management Solution
Automatski - Asset Management SolutionAutomatski - Asset Management Solution
Automatski - Asset Management Solution
 
Automatski - Fleet Management Solution
Automatski - Fleet Management SolutionAutomatski - Fleet Management Solution
Automatski - Fleet Management Solution
 
Automatski - Telecare Solution
Automatski - Telecare SolutionAutomatski - Telecare Solution
Automatski - Telecare Solution
 
Automatski - Smart Meter Solution
Automatski - Smart Meter SolutionAutomatski - Smart Meter Solution
Automatski - Smart Meter Solution
 
Automatski - Smart Home Solution
Automatski - Smart Home SolutionAutomatski - Smart Home Solution
Automatski - Smart Home Solution
 
Automatski - Smart Building Solution
Automatski - Smart Building SolutionAutomatski - Smart Building Solution
Automatski - Smart Building Solution
 
Automatski - Remote Patient Management Solution
Automatski - Remote Patient Management SolutionAutomatski - Remote Patient Management Solution
Automatski - Remote Patient Management Solution
 
Automatski - Industrial Process Monitoring Solution
Automatski - Industrial Process Monitoring SolutionAutomatski - Industrial Process Monitoring Solution
Automatski - Industrial Process Monitoring Solution
 
Automatski - IoT Gateways & Hubs
Automatski - IoT Gateways & HubsAutomatski - IoT Gateways & Hubs
Automatski - IoT Gateways & Hubs
 
Automatski - The Internet of Things - Massively Distributed Realtime Machine ...
Automatski - The Internet of Things - Massively Distributed Realtime Machine ...Automatski - The Internet of Things - Massively Distributed Realtime Machine ...
Automatski - The Internet of Things - Massively Distributed Realtime Machine ...
 
Automatski - The Internet of Things - AutoSIM
Automatski - The Internet of Things - AutoSIMAutomatski - The Internet of Things - AutoSIM
Automatski - The Internet of Things - AutoSIM
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoT
 

Dernier

SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 

Dernier (20)

young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 

Automatski - The Internet of Things - Privacy Standards

  • 1. The Internet of Things – Automatski Corp. http://www.automatski.com E: Aditya@automatski.com , Founder & CEO M:+91-9986574181 E: Shubhadeep.dev@automatski.com , Director - Sales M: +91-8884074204
  • 2.  Automatski is an IoT pioneer in many ways…  With its ground up first principles based IoT Scale Platform  With Infinions.io  Autonomous Compute Platform ®  Autonomous Machine Consumption Certified ®  But Analyst count more than 180 IoT Platforms across the world  An IoT Platform is a tough sell, even if you are cutting edge  Hence we want to eliminate one more possibility of someone choosing others over us.  The IoT Industry is filled with Paranoia about Security & Privacy concerns  Hence we want to address Security and Privacy even within the foundations and early stages of our Architecture and Existence as a Business  That’s why we are doing this!
  • 3.  Automatski is a front runner in addressing IoT Security & Privacy concerns, using a combination of  Research  Standard Industry Practices  Software Engineering Principles  Operational Excellence
  • 4.  Information technology - Security techniques - Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors  This standard provides guidance aimed at ensuring that cloud service providers (such as Amazon and Google) offer suitable information security controls to protect the privacy of their customers’ clients by securing PII (Personally Identifiable Information) entrusted to them.
  • 5.  The Standard contains sets of controls that are intended to be implemented by cloud service providers to ensure security. The Standard sets out controls including (amongst others):  information security policies;  human resource security;  access control;  cryptography;  physical and environmental security;  operations security;  communications security;  supplier relationships;  information security incident management;  information security aspects of business continuity management; and  compliance. *** Not Legally Binding!
  • 6.  Establishes controls over what personal information is collected, maintained, used and disseminated by agencies in the executive branch of the Federal government.  The Privacy Act only applies to records that are located in a “system of records.” As defined in the Privacy Act, a system of records is “a group of any records under the control of any agency from which information is retrieved by the name of the individual or by some identifying number, symbol, or other identifying particular assigned to the individual.”  The Privacy Act guarantees three primary rights:  The right to see records about oneself, subject to Privacy Act exemptions;  The right to request the amendment of records that are not accurate, relevant, timely or complete; and  The right of individuals to be protected against unwarranted invasion of their privacy resulting from the collection, maintenance, use, and disclosure of personal information.
  • 7.  In January of this year the European Commission revealed a draft of its European Data Protection Regulation to replace the previous Data Protection Directive.  The Data Protection Directive is a European Union Directive, which was created to regulate the progression of personal data within the European Union. Officially known as the Directive 95/46/EC the legislation is part of the EU privacy and human rights law.  The aim of the new European Data Protection Regulation is to harmonise the current data protection laws in place across the EU member states. The fact that it is a “regulation” instead of a “directive” means it will be directly applicable to all EU member states without a need for national implementing legislation.
  • 8. 1. Get your privacy policies, procedures and documentation in order and keep them up to date: data protection authorities will be able to ask for these at any time. 2. Form a governance group that oversees all your privacy activities, led by a senior manager or executive. If you have over 250 employees, appoint a data protection officer. The group should develop metrics to measure the status of privacy efforts, report regularly and create statements of compliance that will be required as part of your organization's annual report.
  • 9. 3. Implement a breach notification process and enhance your incident management processes and your detection and response capabilities. Any data breach must be notified to the relevant data protection authority, even if protective measures, such as encryption, are in place; or the likelihood of harm is low. 4. Prepare your organisation to fulfil the "right to be forgotten", "right to erasure" and the "right to data portability". A strategy covering topics such as data classification, retention, collection, destruction, storage and search will be required – and it should cover all mechanisms by which data is collected, including the internet, call centres and paper. 5. Create and enforce privacy throughout your systems' lifecycles to meet the "privacy by design" requirement, whether you buy or develop. This will ensure privacy controls are stronger, simpler to implement, harder to by-pass and totally embedded in a system’s core functionality.
  • 10. 2015 •3rd Product Release •Privacy Act 1974 Compliance 2016 •4th/5th Product Release •ISO/IEC 27018 •EU Data Protection Regulation
  • 11.
  • 12.  10-20+ years of Software Engineering experience each  Global Agile & Technology Consulting, Advisory & Delivery experience of 10-15+ years since Agile and Tech was in Infancy.  The first computers we worked on were Atari and ZX Spectrum ;-) And yes after Basic we went to C/C++ and then straight to Assembly Programming and then -> we began our journey as technologists  Globally Distributed Global & Fortune Company work Experience  Worked with companies like BCG, McKinsey, Fidelity, Tesco, Goldman Sachs…  Long 3-5+ year projects & Over 200+ people globally distributed teams  Led Double Digit Multi-Billion US$ Projects  Blended methodology used comprising of Scrum, XP, Lean and Kanban  From there we rode every wave J2EE, RUP, Six Sigma, CMMI, SIP, Mobile, Cloud, Big Data, Data Science etc…  Individually worked with over 300+ Technologies at a time, literally nothing that scares us   Authors, Speakers, Coach’s, Mentors, Scientists, Engineers, Technologists, Marketing, Sales, HR, Finance…  We are Generalists and we Always start with First Principles.
  • 13.  Please refer to http://automatski.com for more information  Please go through the 2 minute demo, 5 minute demo…  And the showcase section of the website for more information…  Or email us on aditya@automatski.com  Or just give us a shout on Linkedin, Facebook, Twitter, Email etc.