SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
The Encryption Debate
National Security
v.
Individual's Privacy
2nd Annual INBA-IAPP Privacy Summit
Sept. 23, 2016 at Taj Westend, Bangalore
Moderated By:
Kavitha Gupta
Co-chair of IAPP Bangalore Knet
Freedom & Fear at war*
Tangible harm that security
proposal would prevent
v.
Intangible harm that an
intrusion on Privacy would
cause
*President George W. Bush address on Terrorism (20.9.2001)
Will strong encryption be shown to have
hindered law enforcement during terrorist
attack/criminal event ?
Mandate Backdoor
Requesting Companies to assist in unlocking or
decrypting the device
-FBI v. Apple
Encryption laws worldwide
Reference: https://prestonbyrne.com/2015/01/13/you-cant-stop-crypto/
Encryption Ban?
• Government officials around the world are
proposing bills to have encryption weakened
with the only intention to protect citizens
from criminals and terrorists. Will this draft
bill become the first step in a much larger
attack on encryption and on personal
freedoms as well?
INTERNATIONAL CLOUD STORAGE
IMPLICATIONS
• Microsoft Ireland Case: Can a US Warrant
Compel A US Provider to Disclose Data Stored
Abroad?
• The Federal Appeal Court ruled- American
companies don't have to hand over customer
data to U.S. police if it's stored on computers in
another country
Impact of Limiting Encryption
• Consumer Privacy compromised
• Business Issues
Would any regulatory burden on limiting
encryption would influence companies to shift
their businesses overseas with more encryption-
friendly policies?
Thank you!
For any queries/questions, feel free to contact me –
Kavitha Gupta
Co-chair of IAPP Bangalore
KNET: https://iapp.org/about/person/0011a00000DnPVAAA3
LinkedIn: https://in.linkedin.com/in/kavitha-gupta-1809844
Twitter: https://twitter.com/KavithaGupta2
Blog: http://kgritzy.blogspot.in/
Email id: kgritzy@gmail.com/skype:kgritzy1

Contenu connexe

Tendances (6)

20130926a e004101010
20130926a e00410101020130926a e004101010
20130926a e004101010
 
Spring 2015 VJIL Newsletter
Spring 2015 VJIL NewsletterSpring 2015 VJIL Newsletter
Spring 2015 VJIL Newsletter
 
blind to threats
blind to threatsblind to threats
blind to threats
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
WikiLeaks Presentation
WikiLeaks PresentationWikiLeaks Presentation
WikiLeaks Presentation
 
Wikileaks
WikileaksWikileaks
Wikileaks
 

En vedette

Propriedades coliga prof agamenom
Propriedades coliga prof agamenomPropriedades coliga prof agamenom
Propriedades coliga prof agamenomBrito Ronaldo
 
Θεολογία και Χρήματα - Κίμωνας Αθανασίου - Β'1
Θεολογία και Χρήματα - Κίμωνας Αθανασίου - Β'1Θεολογία και Χρήματα - Κίμωνας Αθανασίου - Β'1
Θεολογία και Χρήματα - Κίμωνας Αθανασίου - Β'1Simon Athanasiou
 
Presentation 16 mar 2016 Kittelfjäll
Presentation 16 mar 2016 Kittelfjäll Presentation 16 mar 2016 Kittelfjäll
Presentation 16 mar 2016 Kittelfjäll Björn Arvidsson
 
Lecture 1 xt-n tuxai oilgolt
Lecture 1 xt-n tuxai oilgoltLecture 1 xt-n tuxai oilgolt
Lecture 1 xt-n tuxai oilgoltmunkhuu_a
 
"Аялал жуулчлалын үндэс" Хичээл-7
"Аялал жуулчлалын үндэс" Хичээл-7"Аялал жуулчлалын үндэс" Хичээл-7
"Аялал жуулчлалын үндэс" Хичээл-7E-Gazarchin Online University
 
Зочид буудлын өрөө захиалгын шаардлага
Зочид буудлын өрөө захиалгын шаардлагаЗочид буудлын өрөө захиалгын шаардлага
Зочид буудлын өрөө захиалгын шаардлагаMoba Anax
 
Squint/Strabismus
Squint/StrabismusSquint/Strabismus
Squint/StrabismusSean Thum
 
Liaison CM2-6e Découverte du CDI - Parcours 6
Liaison CM2-6e Découverte du CDI - Parcours  6Liaison CM2-6e Découverte du CDI - Parcours  6
Liaison CM2-6e Découverte du CDI - Parcours 6Claire Chignard
 
Animer un portail documentaire - E-sidoc
Animer un portail documentaire - E-sidocAnimer un portail documentaire - E-sidoc
Animer un portail documentaire - E-sidocClaire Chignard
 
System Design Society Brochure
System Design Society BrochureSystem Design Society Brochure
System Design Society Brochurehadi karami
 
SDR_Simulator4_2
SDR_Simulator4_2SDR_Simulator4_2
SDR_Simulator4_2hadi karami
 

En vedette (15)

Propriedades coliga prof agamenom
Propriedades coliga prof agamenomPropriedades coliga prof agamenom
Propriedades coliga prof agamenom
 
Θεολογία και Χρήματα - Κίμωνας Αθανασίου - Β'1
Θεολογία και Χρήματα - Κίμωνας Αθανασίου - Β'1Θεολογία και Χρήματα - Κίμωνας Αθανασίου - Β'1
Θεολογία και Χρήματα - Κίμωνας Αθανασίου - Β'1
 
Presentation 16 mar 2016 Kittelfjäll
Presentation 16 mar 2016 Kittelfjäll Presentation 16 mar 2016 Kittelfjäll
Presentation 16 mar 2016 Kittelfjäll
 
MSPM-Degree
MSPM-DegreeMSPM-Degree
MSPM-Degree
 
Lecture 1 xt-n tuxai oilgolt
Lecture 1 xt-n tuxai oilgoltLecture 1 xt-n tuxai oilgolt
Lecture 1 xt-n tuxai oilgolt
 
Riya Karmakar (1)
Riya Karmakar (1)Riya Karmakar (1)
Riya Karmakar (1)
 
sai resume win.jpg
sai resume win.jpgsai resume win.jpg
sai resume win.jpg
 
"Аялал жуулчлалын үндэс" Хичээл-7
"Аялал жуулчлалын үндэс" Хичээл-7"Аялал жуулчлалын үндэс" Хичээл-7
"Аялал жуулчлалын үндэс" Хичээл-7
 
seminar presentation
seminar presentationseminar presentation
seminar presentation
 
Зочид буудлын өрөө захиалгын шаардлага
Зочид буудлын өрөө захиалгын шаардлагаЗочид буудлын өрөө захиалгын шаардлага
Зочид буудлын өрөө захиалгын шаардлага
 
Squint/Strabismus
Squint/StrabismusSquint/Strabismus
Squint/Strabismus
 
Liaison CM2-6e Découverte du CDI - Parcours 6
Liaison CM2-6e Découverte du CDI - Parcours  6Liaison CM2-6e Découverte du CDI - Parcours  6
Liaison CM2-6e Découverte du CDI - Parcours 6
 
Animer un portail documentaire - E-sidoc
Animer un portail documentaire - E-sidocAnimer un portail documentaire - E-sidoc
Animer un portail documentaire - E-sidoc
 
System Design Society Brochure
System Design Society BrochureSystem Design Society Brochure
System Design Society Brochure
 
SDR_Simulator4_2
SDR_Simulator4_2SDR_Simulator4_2
SDR_Simulator4_2
 

Similaire à Encryption - Conflict between National Interest and Individual's Privacy

From the Cuckoo’s Egg to Global Surveillance Cyber Espion
From the Cuckoo’s Egg to Global Surveillance Cyber EspionFrom the Cuckoo’s Egg to Global Surveillance Cyber Espion
From the Cuckoo’s Egg to Global Surveillance Cyber EspionJeanmarieColbert3
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 
how we design privacy for smart city and tech
how we design privacy for smart city and techhow we design privacy for smart city and tech
how we design privacy for smart city and techMomokoImamura
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacEvonCanales257
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Kevin Murphy
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or governmentM S Siddiqui
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalLeslie Lee
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 

Similaire à Encryption - Conflict between National Interest and Individual's Privacy (18)

From the Cuckoo’s Egg to Global Surveillance Cyber Espion
From the Cuckoo’s Egg to Global Surveillance Cyber EspionFrom the Cuckoo’s Egg to Global Surveillance Cyber Espion
From the Cuckoo’s Egg to Global Surveillance Cyber Espion
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
how we design privacy for smart city and tech
how we design privacy for smart city and techhow we design privacy for smart city and tech
how we design privacy for smart city and tech
 
Cyber Legislation
Cyber LegislationCyber Legislation
Cyber Legislation
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Sec Wars Episode 3
Sec Wars Episode 3Sec Wars Episode 3
Sec Wars Episode 3
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Berkley Law Writing Competition
Berkley Law Writing CompetitionBerkley Law Writing Competition
Berkley Law Writing Competition
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 

Dernier

一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理F La
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for projectVarshRR
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书irst
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理bd2c5966a56d
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理Fir La
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理e9733fc35af6
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsNilendra Kumar
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理Airst S
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdfTodd Spodek
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理e9733fc35af6
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理Airst S
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Abdul-Hakim Shabazz
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSCssSpamx
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理e9733fc35af6
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理Airst S
 

Dernier (20)

一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law Students
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
 
Chambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&AChambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&A
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 

Encryption - Conflict between National Interest and Individual's Privacy

  • 1. The Encryption Debate National Security v. Individual's Privacy 2nd Annual INBA-IAPP Privacy Summit Sept. 23, 2016 at Taj Westend, Bangalore Moderated By: Kavitha Gupta Co-chair of IAPP Bangalore Knet
  • 2. Freedom & Fear at war* Tangible harm that security proposal would prevent v. Intangible harm that an intrusion on Privacy would cause *President George W. Bush address on Terrorism (20.9.2001)
  • 3. Will strong encryption be shown to have hindered law enforcement during terrorist attack/criminal event ?
  • 4. Mandate Backdoor Requesting Companies to assist in unlocking or decrypting the device -FBI v. Apple
  • 5. Encryption laws worldwide Reference: https://prestonbyrne.com/2015/01/13/you-cant-stop-crypto/
  • 6. Encryption Ban? • Government officials around the world are proposing bills to have encryption weakened with the only intention to protect citizens from criminals and terrorists. Will this draft bill become the first step in a much larger attack on encryption and on personal freedoms as well?
  • 7. INTERNATIONAL CLOUD STORAGE IMPLICATIONS • Microsoft Ireland Case: Can a US Warrant Compel A US Provider to Disclose Data Stored Abroad? • The Federal Appeal Court ruled- American companies don't have to hand over customer data to U.S. police if it's stored on computers in another country
  • 8. Impact of Limiting Encryption • Consumer Privacy compromised • Business Issues Would any regulatory burden on limiting encryption would influence companies to shift their businesses overseas with more encryption- friendly policies?
  • 9. Thank you! For any queries/questions, feel free to contact me – Kavitha Gupta Co-chair of IAPP Bangalore KNET: https://iapp.org/about/person/0011a00000DnPVAAA3 LinkedIn: https://in.linkedin.com/in/kavitha-gupta-1809844 Twitter: https://twitter.com/KavithaGupta2 Blog: http://kgritzy.blogspot.in/ Email id: kgritzy@gmail.com/skype:kgritzy1