SlideShare une entreprise Scribd logo
1  sur  21
Balancing Privacy and Digitization
Maintaining privacy in and increasingly digitized environment
1
My Data, What?!?
2
Data Breaches
Everywhere!
3
What data?
Data about you
• Name
• Nationality/Residency
• Age
• Likes and Dislikes
• Relatives
• Associates
• Medical Information
• Etc.
Data about what you do
• Location/Travel (history and
current)
• Frequent websites/apps
• Entertainment you like
(music, movies,
parties/events, etc.)
• Voice
4
Digitization
5
What is it?
Digitization • Is the process of moving to a digital
business
• It is the use of digital technologies
to change a business model and
provide new revenue and value-
producing opportunities
*Gartner.com
6
Data as an Asset
• Data isn’t just information on customers
anymore
• Assets can be used to make money
• Assets can be used to acquire more
assets
• Data informs decisions
Acquire
Curate
EnhanceAnalyze
Monetize
7
Privacy
8
What is it?
Privacy • (IT) what data can be shared
with a third party
• Being free from unwanted or
undue intrusion or disturbance
in one’s private life
*TechTarget.com
*Dictionary.com
9
Threats and Risks to Privacy
• Web Tracking
• Data Collections
• Lack of Security
• Connected Everything – IoT
• Public/Free Wi-Fi
• Social Networking
• Social Engineering
Threats:
• Discrimination
• Disclosure of Information
• Lack of Anonymity
• Movement of Data
Risks:
10
What Laws Are There To Protect Privacy?
• The Jamaican Constitution, The
Charter of Fundamental Rights
and Freedoms – Chapter 3
• The International Covenant on
Civil and Political Rights (ICCPR)
– Article 17
Local Laws
• General Data Protection
Regulation (GDPR) - EU
• The Data Protection Act – UK
• Personal Information Protection
Act – Bermuda
• Data Protection Law - Cayman
Islands
International/Regional Laws
11
The Balance
12
Can We Really Have Privacy?
Individuals Companies|
13
Awareness is Key
14
Understand the laws that protect/guide you
Understand what you are signing/agreeing to |
your obligations to customers
Understand the technology you are using
Ensure your technology is up to date
Companies Using Data
*Gartner.com
15
Advancing Business Insights With Privacy in Mind
Privacy
Systems
Analytics
Laws
People
16
How Does Your Company Use Data?
17
Process
Perform some assessment or
transformation of data
Control
Collect and store
data and may
process data
None
Manual business,
paper based
business
*GDPR
Even More Analytics
18
Identify
• Map data on customers
• Create flags
Classify
• Region/Jurisdiction
• Exemption/Do not process
Action
• Update existing analytics
• Educate and enforce
What else can we do?
19
Define what a breach is
Develop communication strategy
Update policies
Prepare/Update privacy clauses
Prepare privacy request processes
Thank you Q&A
20
Sources
• https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-
breaches-of-the-21st-century.html
• https://www.gartner.com/it-glossary/digitalization/
• https://searchdatamanagement.techtarget.com/definition/privacy
• http://www.dictionary.com/browse/privacy
• https://www.pocket-lint.com/apps/news/143404-7-biggest-privacy-threats-
online
• https://searchsecurity.techtarget.com/tip/A-look-at-the-key-GDPR-
requirements-and-how-to-meet-
them?src=5737362&asrc=EM_ERU_94056887&utm_content=eru-rd2-
rcpE&utm_medium=EM&utm_source=ERU&utm_campaign=20180426_ERU
%20Transmission%20for%2004/26/2018%20(UserUniverse:%202572767)
21

Contenu connexe

Tendances

DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
Rodonoghue72
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
Amy Purcell
 

Tendances (20)

European GDPR for Good Technology Collective (GTC)
European GDPR for Good Technology Collective (GTC)European GDPR for Good Technology Collective (GTC)
European GDPR for Good Technology Collective (GTC)
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Legal update
Legal updateLegal update
Legal update
 
GDPR - Sink or Swim
GDPR - Sink or SwimGDPR - Sink or Swim
GDPR - Sink or Swim
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
GDPR for WordPress - Impacts & Solutions
GDPR for WordPress - Impacts & SolutionsGDPR for WordPress - Impacts & Solutions
GDPR for WordPress - Impacts & Solutions
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
Get you and your business GDPR ready
Get you and your business GDPR readyGet you and your business GDPR ready
Get you and your business GDPR ready
 
Exploring GDPR
Exploring GDPRExploring GDPR
Exploring GDPR
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
 
GDPR From Implementation to Opportunity
GDPR From Implementation to OpportunityGDPR From Implementation to Opportunity
GDPR From Implementation to Opportunity
 
Changing legislation – General Data Protection Regulation (GDPR) and librarie...
Changing legislation – General Data Protection Regulation (GDPR) and librarie...Changing legislation – General Data Protection Regulation (GDPR) and librarie...
Changing legislation – General Data Protection Regulation (GDPR) and librarie...
 
Optimize your info-driven business processes. How to move from paper to digital
Optimize your info-driven business processes. How to move from paper to digitalOptimize your info-driven business processes. How to move from paper to digital
Optimize your info-driven business processes. How to move from paper to digital
 
Current Privacy and Data Issues (for people who care about open data!)
Current Privacy and Data Issues (for people who care about open data!)Current Privacy and Data Issues (for people who care about open data!)
Current Privacy and Data Issues (for people who care about open data!)
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Gdpr in a nutshell
Gdpr in a nutshellGdpr in a nutshell
Gdpr in a nutshell
 
What does GDPR mean for your charity?
What does GDPR mean for your charity?What does GDPR mean for your charity?
What does GDPR mean for your charity?
 

Similaire à Balancing Privacy and Digitization

LW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptxLW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptx
TimBee1
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
emermell
 

Similaire à Balancing Privacy and Digitization (20)

GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare Industry
 
Preparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection BillPreparing your Business for the Data Protection Bill
Preparing your Business for the Data Protection Bill
 
Bridging the Gap Between Privacy and Retention
Bridging the Gap Between Privacy and RetentionBridging the Gap Between Privacy and Retention
Bridging the Gap Between Privacy and Retention
 
GDPR and Cyber Security LW.pptx
GDPR and Cyber Security LW.pptxGDPR and Cyber Security LW.pptx
GDPR and Cyber Security LW.pptx
 
LW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptxLW GDPR and Cyber Security.pptx
LW GDPR and Cyber Security.pptx
 
Scotland legal update 25 sept
Scotland legal update   25 septScotland legal update   25 sept
Scotland legal update 25 sept
 
Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)
 
What does GDPR mean for your business?
What does GDPR mean for your business?What does GDPR mean for your business?
What does GDPR mean for your business?
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
13687562.ppt
13687562.ppt13687562.ppt
13687562.ppt
 
5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...5) How charities can protect themselves against data reform - ‘Emerging Digit...
5) How charities can protect themselves against data reform - ‘Emerging Digit...
 
GDPR Practicalities - The Data Shed
GDPR Practicalities - The Data ShedGDPR Practicalities - The Data Shed
GDPR Practicalities - The Data Shed
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 

Plus de Symptai Consulting Limited

Plus de Symptai Consulting Limited (18)

Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptx
 
Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdf
 
Integrated Security for Software Development and Advanced Penetration Testing...
Integrated Security for Software Development and Advanced Penetration Testing...Integrated Security for Software Development and Advanced Penetration Testing...
Integrated Security for Software Development and Advanced Penetration Testing...
 
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfStrengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
 
Keeping security relevant amid digital transformation
Keeping security relevant amid digital transformationKeeping security relevant amid digital transformation
Keeping security relevant amid digital transformation
 
Realizing the benefits of Digital Transformation
Realizing the benefits of Digital TransformationRealizing the benefits of Digital Transformation
Realizing the benefits of Digital Transformation
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 
Why cost optimization is the way of the future
Why cost optimization is the way of the futureWhy cost optimization is the way of the future
Why cost optimization is the way of the future
 
Best practices for PCI compliance
Best practices for PCI compliance Best practices for PCI compliance
Best practices for PCI compliance
 
The role of Technology: Battling Financial Crime
The role of Technology: Battling Financial CrimeThe role of Technology: Battling Financial Crime
The role of Technology: Battling Financial Crime
 
Data Protection: An Approach to Privacy
Data Protection: An Approach to PrivacyData Protection: An Approach to Privacy
Data Protection: An Approach to Privacy
 
Data Analytics: Improving Business
Data Analytics: Improving BusinessData Analytics: Improving Business
Data Analytics: Improving Business
 
IT Audit - Evolve and Stay in the Game
IT Audit - Evolve and Stay in the GameIT Audit - Evolve and Stay in the Game
IT Audit - Evolve and Stay in the Game
 
Misconceptions of Business Continuity Planning
Misconceptions of Business Continuity PlanningMisconceptions of Business Continuity Planning
Misconceptions of Business Continuity Planning
 
Cyber-Attack and Security: Putting the Audit Committee on High Alert
Cyber-Attack and Security: Putting the Audit Committee on High AlertCyber-Attack and Security: Putting the Audit Committee on High Alert
Cyber-Attack and Security: Putting the Audit Committee on High Alert
 
Data mining: How it can Help Boost Effectiveness
Data mining: How it can Help Boost EffectivenessData mining: How it can Help Boost Effectiveness
Data mining: How it can Help Boost Effectiveness
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Governance: a tool for growth
Governance: a tool for growthGovernance: a tool for growth
Governance: a tool for growth
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Balancing Privacy and Digitization

  • 1. Balancing Privacy and Digitization Maintaining privacy in and increasingly digitized environment 1
  • 4. What data? Data about you • Name • Nationality/Residency • Age • Likes and Dislikes • Relatives • Associates • Medical Information • Etc. Data about what you do • Location/Travel (history and current) • Frequent websites/apps • Entertainment you like (music, movies, parties/events, etc.) • Voice 4
  • 6. What is it? Digitization • Is the process of moving to a digital business • It is the use of digital technologies to change a business model and provide new revenue and value- producing opportunities *Gartner.com 6
  • 7. Data as an Asset • Data isn’t just information on customers anymore • Assets can be used to make money • Assets can be used to acquire more assets • Data informs decisions Acquire Curate EnhanceAnalyze Monetize 7
  • 9. What is it? Privacy • (IT) what data can be shared with a third party • Being free from unwanted or undue intrusion or disturbance in one’s private life *TechTarget.com *Dictionary.com 9
  • 10. Threats and Risks to Privacy • Web Tracking • Data Collections • Lack of Security • Connected Everything – IoT • Public/Free Wi-Fi • Social Networking • Social Engineering Threats: • Discrimination • Disclosure of Information • Lack of Anonymity • Movement of Data Risks: 10
  • 11. What Laws Are There To Protect Privacy? • The Jamaican Constitution, The Charter of Fundamental Rights and Freedoms – Chapter 3 • The International Covenant on Civil and Political Rights (ICCPR) – Article 17 Local Laws • General Data Protection Regulation (GDPR) - EU • The Data Protection Act – UK • Personal Information Protection Act – Bermuda • Data Protection Law - Cayman Islands International/Regional Laws 11
  • 13. Can We Really Have Privacy? Individuals Companies| 13
  • 14. Awareness is Key 14 Understand the laws that protect/guide you Understand what you are signing/agreeing to | your obligations to customers Understand the technology you are using Ensure your technology is up to date
  • 16. Advancing Business Insights With Privacy in Mind Privacy Systems Analytics Laws People 16
  • 17. How Does Your Company Use Data? 17 Process Perform some assessment or transformation of data Control Collect and store data and may process data None Manual business, paper based business *GDPR
  • 18. Even More Analytics 18 Identify • Map data on customers • Create flags Classify • Region/Jurisdiction • Exemption/Do not process Action • Update existing analytics • Educate and enforce
  • 19. What else can we do? 19 Define what a breach is Develop communication strategy Update policies Prepare/Update privacy clauses Prepare privacy request processes
  • 21. Sources • https://www.csoonline.com/article/2130877/data-breach/the-biggest-data- breaches-of-the-21st-century.html • https://www.gartner.com/it-glossary/digitalization/ • https://searchdatamanagement.techtarget.com/definition/privacy • http://www.dictionary.com/browse/privacy • https://www.pocket-lint.com/apps/news/143404-7-biggest-privacy-threats- online • https://searchsecurity.techtarget.com/tip/A-look-at-the-key-GDPR- requirements-and-how-to-meet- them?src=5737362&asrc=EM_ERU_94056887&utm_content=eru-rd2- rcpE&utm_medium=EM&utm_source=ERU&utm_campaign=20180426_ERU %20Transmission%20for%2004/26/2018%20(UserUniverse:%202572767) 21

Notes de l'éditeur

  1. Welcome everyone Thank you for joining us today
  2. Very timely topic considering the EU’s General Data Protection Regulation (GDPR) and Cambridge Analytica’s data privacy issues currently in the news. As Information System Auditors/Data Analysts/Business Analysts here at Symptai – changes like this are important/interesting to us – Governance Previous examples of breaches…
  3. https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html image - https://imgflip.com/s/meme/X-Everywhere.jpg
  4. Pros and Cons
  5. https://www.gartner.com/it-glossary/digitalization/ Image - https://openclipart.org/detail/289225/clipboard-check Image - https://openclipart.org/detail/296351/desktop-computer-3
  6. KYC – Know Your Customer TRN – Tax Registration Number
  7. https://searchdatamanagement.techtarget.com/definition/privacy http://www.dictionary.com/browse/privacy
  8. https://www.pocket-lint.com/apps/news/143404-7-biggest-privacy-threats-online
  9. Data Subject’ s Right to: Know Prevent Processing Likely to Cause Damage or Distress Prevent Processing for Purposes of Direct Marketing Constrain Automated Decision Taking Rectification of Inaccuracies Data Controller Registration Appointment of Data Protection Officer Adherence to Processing Standards Data Protection Impact Assessment Prosecution, Penalties, Liabilities ICCPR - provides that no one shall be subjected to an arbitrary or unlawful interference with his or her privacy
  10. http://freevector.co/vector-icons/business/business-scale-with-a-man-and-resources-gears-symbol.html
  11. https://qph.fs.quoracdn.net/main-qimg-fab05bfbe22c6f8941c8a400efdd9135 https://www.cqse.eu/images/company/company-landscape.png
  12. 1 know what data you currently have on customers and what jurisdiction they belong to 2 flags can help to easily manage info on the data you do or do not have 3 know which laws apply to who 4 id  quickly and easily remove persons from analytics or even from system if requested 5 refine existing analytics using the map and flags and exemptions | do analytics assume too much  discrimination 6 educate customers and staff (personal and office data security) | have someone responsible (data protection officer) https://searchsecurity.techtarget.com/tip/A-look-at-the-key-GDPR-requirements-and-how-to-meet-them?src=5737362&asrc=EM_ERU_94056887&utm_content=eru-rd2-rcpE&utm_medium=EM&utm_source=ERU&utm_campaign=20180426_ERU%20Transmission%20for%2004/26/2018%20(UserUniverse:%202572767)
  13. Call to Action!