SlideShare une entreprise Scribd logo
1  sur  31
Privacy and video surveillance: Advanced
technology and best practices protecting
people, property and personal data
Presented by:
Antoinette King - Key Account Manager, Axis Communications
Salvatore D’Agostino - CEO IDmachines, Co-Founder OpenConsent
IN PARTNERSHIP WITH
PRESENTS
Presenters
Sal D’Agostino
CEO IDmachines, Co-
Founder OpenConsent
Antoinette King, PSP
Key Account Manager
Axis Communications
Agenda
Evolving Landscape
Regulatory
Technology
Risk
Use Cases
Education
City Surveillance
Best Practices
Q&A
Agenda
An evolving symbiotic relationship
An evolving symbiotic relationship
Domain of
Privacy 2.0
Domain of
Privacy 1.0
Data
control
Data
transparency
Data protection
Terms and
conditions
Privacy
notices
Notification
& breaches
Most encryption techniques
Identity
Openness,Usability,Relevance
Data
collection is
everywhere
Lack of
Control
•FEAR
•UNCERTAINTY
•DOUBT
Evolving landscape
> Domestic and global changes
in Regulations
> Technology keeps evolving
> Risk Landscape
Legislation pertaining to biometric data privacy
> State of Illinois – requires private
entities to get written permission to
collect biometric data and full usage
disclosure.
> State of Washington – places a
heavy burden on the controller of the
data to properly obtain consent,
disclose usage, and protect the data
> State of Texas – prohibits capture of
biometric data without written,
informed consent, and prohibits the
sale or disclosure of biometric
identifiers.
Regulatory
changes
> CCPA vs. GDPR
> NY SHIELD Act
> Accountability
GDPR Landscape
> In the first 9 months that
GDPR was in effect, there
were over 205,000 cases
reported to various EU
Supervisory Authorities.
> 65,000 breaches involving
things such as email
misconduct, network hacks,
improper tracking of
consumers and illegal video
surveillance data logging
GDPR Fines
UNITED
KINGDOM
Information
Commissioner
(ICO)
2019-
07-08
204,600,000 Major Airline Art. 32 GDPR Insufficient technical
and organisational
measures to ensure
information security
link
UNITED
KINGDOM
Information
Commissioner
(ICO)
2019-
07-09
110,390,200 Hotel Chain Art. 32 GDPR Insufficient technical
and organisational
measures to ensure
information security
link
FRANCE
French Data
Protection
Authority (CNIL)
2019-
01-21
50,000,000 Digital Technology
Company
Art. 13 GDPR, Art.
14 GDPR, Art. 6
GDPR, Art. 5 GDPR
Insufficient legal basis
for data processing
link
ITALY
Italian Data
Protection
Authority
(Garante)
2020-
01-15
27,800,000 Telecommunications
Operator
Art. 5 GDPR, Art. 6
GDPR, Art. 17
GDPR, Art. 21
GDPR, Art. 32
GDPR
Insufficient legal basis
for data processing
link
AUSTRIA
Austrian Data
Protection
Authority (dsb)
2019-
10-23
18,000,000 Postal Services
Company
Art. 5 (1) a) GDPR,
Art. 6 GDPR
Insufficient legal basis
for data processing
link
GERMANY
Data Protection Authority of
Berlin
2019-
10-30
14,500,00
0
Property
Company
Art. 5 GDPR,
Art. 25 GDPR
Non-compliance with
general data processing
principles
link
GERMANY
The Federal Commissioner
for Data Protection and
Freedom of Information
(BfDI)
2019-
12-09
9,550,000 Telecoms
provider
Art. 32 GDPR Insufficient technical
and organisational
measures to ensure
information security
link
ITALY
Italian Data Protection
Authority (Garante)
2019-
12-11
8,500,000 Gas &
Energy
Company
Art. 5 GDPR,
Art. 6 GDPR,
Art. 17 GDPR,
Art. 21 GDPR
Insufficient legal basis
for data processing
link
SWEDEN
Data Protection Authority of
Sweden
2020-
03-11
7,000,000 Digital
Technology
Company
Art. 5 GDPR,
Art. 6 GDPR,
Art. 17 GDPR
Insufficient fulfilment of
data subjects rights
link
ITALY
Italian Data Protection
Authority (Garante)
2019-
12-11
3,000,000 Gas &
Energy
Company
Art. 5 GDPR,
Art. 6 GDPR
Insufficient legal basis
for data processing
link
GDPR Fines
Does it
apply
to me?
https://www.lexology.com/library/detail.aspx?g=20fce77c-feaf-4cda-851a-5542b48b63f4
When can surveillance
be used?
> Purpose must be explicit and documented
> Must be a legitimate interest to override
subjects’ privacy rights
> Prove that less intrusive means would not
suffice
> Appropriate safeguards must be taken
when storing video data
> Warning signs must be clearly posted with
an icon to easily identify video
surveillance in progress
> Warning sign must include the purpose of
surveillance and the data subject’s rights
Differential
Privacy
Mitigating Privacy concernsMitigating Privacy concerns
Evolving Technology
> Moore’s Law
˗ Computing and Sensing
> Big Data
> Cloud
> AI/ML
> IoT
Evolving Risk Landscape and Risk Management
> Surveillance Economics and Data Sharing
> Consumerization of Technology
> Asymmetry - Attackers and Target
> Siloed Systems, Communications and Development
> Skill Gaps
> Algorithm Bias
> Alchemy vs. Science/Engineering
School surveillance
> Biometric Data/Facial
Recognition
> 3rd Party Operators
> Consent
> Cloud solutions
City surveillance
> What kind of data is
being collected?
> How is my data being
used?
> Am I being tracked?
> Biases in software
code
Public resistance
Surveillance “Fashion”
Best practices - summary
1. Notice and Consent
a. “I Agree”
b. Use of (Consent) Receipts
c. “Signs”
2. Legal requirements
a. Privacy - GDPR, CCPA, Washington State
b. Children - COPPA,
3. Frameworks
a. ISO, NIST, IDESG, Pan-Canadian Trust Framework
4. Industry Code of Conduct and Practice
a. Proactive approach, based on best practices
Cybersecurity-
related privacy
events
PROTECT-P
DETECT
RESPOND
RECOVER
Cybersecurity
risks
IDENTIFY
PROTECT
DETECT
RESPOND
RECOVER
Privacy
risks
IDENTIFY-P
GOVERN-P
CONTROL-P
COMMUNICATE-P
Privacy checklist
Thank you.

Contenu connexe

Tendances

Webinar - Security 2.0: A new way to deal with today’s security challenges in...
Webinar - Security 2.0: A new way to deal with today’s security challenges in...Webinar - Security 2.0: A new way to deal with today’s security challenges in...
Webinar - Security 2.0: A new way to deal with today’s security challenges in...Quiver
 
The Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event ProfessionalsThe Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event ProfessionalsHubilo
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
 
Odoo iot box integration
Odoo iot box integrationOdoo iot box integration
Odoo iot box integrationCeline George
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...Giulio Coraggio
 
Data Masking: Testing with Near-real Data
Data Masking: Testing with Near-real DataData Masking: Testing with Near-real Data
Data Masking: Testing with Near-real DataTechWell
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetupIshay Tentser
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?Faidepro
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Securitydocomusa
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCapgemini
 
IoT Policy and Regulatory Framework
IoT Policy and Regulatory FrameworkIoT Policy and Regulatory Framework
IoT Policy and Regulatory FrameworkGwanhoo Lee
 
The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationGhostery, Inc.
 
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftMind the Byte
 

Tendances (20)

ICANN WhoIs Backgrounder
ICANN WhoIs BackgrounderICANN WhoIs Backgrounder
ICANN WhoIs Backgrounder
 
Webinar - Security 2.0: A new way to deal with today’s security challenges in...
Webinar - Security 2.0: A new way to deal with today’s security challenges in...Webinar - Security 2.0: A new way to deal with today’s security challenges in...
Webinar - Security 2.0: A new way to deal with today’s security challenges in...
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
SAP Business One
SAP Business OneSAP Business One
SAP Business One
 
The Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event ProfessionalsThe Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event Professionals
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Odoo iot box integration
Odoo iot box integrationOdoo iot box integration
Odoo iot box integration
 
Session 5 6
Session 5 6Session 5 6
Session 5 6
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...
 
Data Masking: Testing with Near-real Data
Data Masking: Testing with Near-real DataData Masking: Testing with Near-real Data
Data Masking: Testing with Near-real Data
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetup
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
 
IoT Policy and Regulatory Framework
IoT Policy and Regulatory FrameworkIoT Policy and Regulatory Framework
IoT Policy and Regulatory Framework
 
The Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection RegulationThe Practical Impact of the General Data Protection Regulation
The Practical Impact of the General Data Protection Regulation
 
IoT_Implemented
IoT_ImplementedIoT_Implemented
IoT_Implemented
 
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florerNtxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
 
Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018Code of practice_for_consumer_io_t_security_october_2018
Code of practice_for_consumer_io_t_security_october_2018
 
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
 

Similaire à Privacy and video surveillance: Advanced technology and best practices protecting people, property and personal data

Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Ray Bugg
 
General Data Protection Regulation - Compliance
General Data Protection Regulation - ComplianceGeneral Data Protection Regulation - Compliance
General Data Protection Regulation - ComplianceAdityaChhajed
 
Splunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR ComplianceSplunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR ComplianceMarketingArrowECS_CZ
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
Accenture - How Will Policing and Justice Be Affected By the Data Protection ...
Accenture - How Will Policing and Justice Be Affected By the Data Protection ...Accenture - How Will Policing and Justice Be Affected By the Data Protection ...
Accenture - How Will Policing and Justice Be Affected By the Data Protection ...techUK
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...IISPEastMids
 
Concerns about the environment and intellectual property.pdf
Concerns about the environment and intellectual property.pdfConcerns about the environment and intellectual property.pdf
Concerns about the environment and intellectual property.pdfspringgalaxy1
 
EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2Paul Richards
 
EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2Keith Purves
 
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...Jessica Pattison
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowSymantec
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz..."Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...Cédric Laurant
 
Legal issues of the Internet of Things
Legal issues of the Internet of ThingsLegal issues of the Internet of Things
Legal issues of the Internet of ThingsGiulio Coraggio
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 

Similaire à Privacy and video surveillance: Advanced technology and best practices protecting people, property and personal data (20)

Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019
 
Cloud and Data Privacy
Cloud and Data PrivacyCloud and Data Privacy
Cloud and Data Privacy
 
General Data Protection Regulation - Compliance
General Data Protection Regulation - ComplianceGeneral Data Protection Regulation - Compliance
General Data Protection Regulation - Compliance
 
Splunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR ComplianceSplunk: How Machine Data Supports GDPR Compliance
Splunk: How Machine Data Supports GDPR Compliance
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
Accenture - How Will Policing and Justice Be Affected By the Data Protection ...
Accenture - How Will Policing and Justice Be Affected By the Data Protection ...Accenture - How Will Policing and Justice Be Affected By the Data Protection ...
Accenture - How Will Policing and Justice Be Affected By the Data Protection ...
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
 
Concerns about the environment and intellectual property.pdf
Concerns about the environment and intellectual property.pdfConcerns about the environment and intellectual property.pdf
Concerns about the environment and intellectual property.pdf
 
EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2
 
EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2EveryCloud_GDPR_Whitepaper_v2
EveryCloud_GDPR_Whitepaper_v2
 
GPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-RightGPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-Right
 
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz..."Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
 
Legal issues of the Internet of Things
Legal issues of the Internet of ThingsLegal issues of the Internet of Things
Legal issues of the Internet of Things
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Privacy and video surveillance: Advanced technology and best practices protecting people, property and personal data

  • 1. Privacy and video surveillance: Advanced technology and best practices protecting people, property and personal data Presented by: Antoinette King - Key Account Manager, Axis Communications Salvatore D’Agostino - CEO IDmachines, Co-Founder OpenConsent IN PARTNERSHIP WITH PRESENTS
  • 2. Presenters Sal D’Agostino CEO IDmachines, Co- Founder OpenConsent Antoinette King, PSP Key Account Manager Axis Communications
  • 4. An evolving symbiotic relationship
  • 5. An evolving symbiotic relationship
  • 6. Domain of Privacy 2.0 Domain of Privacy 1.0 Data control Data transparency Data protection Terms and conditions Privacy notices Notification & breaches Most encryption techniques Identity Openness,Usability,Relevance
  • 10.
  • 11. Evolving landscape > Domestic and global changes in Regulations > Technology keeps evolving > Risk Landscape
  • 12. Legislation pertaining to biometric data privacy > State of Illinois – requires private entities to get written permission to collect biometric data and full usage disclosure. > State of Washington – places a heavy burden on the controller of the data to properly obtain consent, disclose usage, and protect the data > State of Texas – prohibits capture of biometric data without written, informed consent, and prohibits the sale or disclosure of biometric identifiers.
  • 13. Regulatory changes > CCPA vs. GDPR > NY SHIELD Act > Accountability
  • 14. GDPR Landscape > In the first 9 months that GDPR was in effect, there were over 205,000 cases reported to various EU Supervisory Authorities. > 65,000 breaches involving things such as email misconduct, network hacks, improper tracking of consumers and illegal video surveillance data logging
  • 15. GDPR Fines UNITED KINGDOM Information Commissioner (ICO) 2019- 07-08 204,600,000 Major Airline Art. 32 GDPR Insufficient technical and organisational measures to ensure information security link UNITED KINGDOM Information Commissioner (ICO) 2019- 07-09 110,390,200 Hotel Chain Art. 32 GDPR Insufficient technical and organisational measures to ensure information security link FRANCE French Data Protection Authority (CNIL) 2019- 01-21 50,000,000 Digital Technology Company Art. 13 GDPR, Art. 14 GDPR, Art. 6 GDPR, Art. 5 GDPR Insufficient legal basis for data processing link ITALY Italian Data Protection Authority (Garante) 2020- 01-15 27,800,000 Telecommunications Operator Art. 5 GDPR, Art. 6 GDPR, Art. 17 GDPR, Art. 21 GDPR, Art. 32 GDPR Insufficient legal basis for data processing link AUSTRIA Austrian Data Protection Authority (dsb) 2019- 10-23 18,000,000 Postal Services Company Art. 5 (1) a) GDPR, Art. 6 GDPR Insufficient legal basis for data processing link
  • 16. GERMANY Data Protection Authority of Berlin 2019- 10-30 14,500,00 0 Property Company Art. 5 GDPR, Art. 25 GDPR Non-compliance with general data processing principles link GERMANY The Federal Commissioner for Data Protection and Freedom of Information (BfDI) 2019- 12-09 9,550,000 Telecoms provider Art. 32 GDPR Insufficient technical and organisational measures to ensure information security link ITALY Italian Data Protection Authority (Garante) 2019- 12-11 8,500,000 Gas & Energy Company Art. 5 GDPR, Art. 6 GDPR, Art. 17 GDPR, Art. 21 GDPR Insufficient legal basis for data processing link SWEDEN Data Protection Authority of Sweden 2020- 03-11 7,000,000 Digital Technology Company Art. 5 GDPR, Art. 6 GDPR, Art. 17 GDPR Insufficient fulfilment of data subjects rights link ITALY Italian Data Protection Authority (Garante) 2019- 12-11 3,000,000 Gas & Energy Company Art. 5 GDPR, Art. 6 GDPR Insufficient legal basis for data processing link GDPR Fines
  • 18. When can surveillance be used? > Purpose must be explicit and documented > Must be a legitimate interest to override subjects’ privacy rights > Prove that less intrusive means would not suffice > Appropriate safeguards must be taken when storing video data > Warning signs must be clearly posted with an icon to easily identify video surveillance in progress > Warning sign must include the purpose of surveillance and the data subject’s rights
  • 21. Evolving Technology > Moore’s Law ˗ Computing and Sensing > Big Data > Cloud > AI/ML > IoT
  • 22. Evolving Risk Landscape and Risk Management > Surveillance Economics and Data Sharing > Consumerization of Technology > Asymmetry - Attackers and Target > Siloed Systems, Communications and Development > Skill Gaps > Algorithm Bias > Alchemy vs. Science/Engineering
  • 23. School surveillance > Biometric Data/Facial Recognition > 3rd Party Operators > Consent > Cloud solutions
  • 25. > What kind of data is being collected? > How is my data being used? > Am I being tracked? > Biases in software code Public resistance
  • 27. Best practices - summary 1. Notice and Consent a. “I Agree” b. Use of (Consent) Receipts c. “Signs” 2. Legal requirements a. Privacy - GDPR, CCPA, Washington State b. Children - COPPA, 3. Frameworks a. ISO, NIST, IDESG, Pan-Canadian Trust Framework 4. Industry Code of Conduct and Practice a. Proactive approach, based on best practices
  • 29.