Aurélie Pols draws a broad philosophical picture of the data ecosystem and then hones in on the right to data portability.
Strata keynote London may 2017, https://www.oreilly.com/ideas/the-data-subject-first
This document summarizes several comprehensive legal research websites that provide information for legal professionals, students, and the general public. It describes the key features and resources available on websites such as Findlaw, Justia, HeirosGamos, Cornell Law School's Legal Information Institute, Washlaw, the Law Library of Congress, and LawyerExpress. These sites offer links to primary and secondary legal sources, case law, legal news, blogs, practice tools, and international law databases. Resources include things like annotations to the U.S. Constitution, citation examples, dictionaries, state-specific information, and subject indexes.
Brussels data science - Privacy Engineering for Big Data & Data ScienceAurélie Pols
This presentation walks through the challenges and opportunities for data scientists and big data professionals, with a focus on Privacy, describing which future roles will be needed in order to successfully bridge the written word of the law with coded data trails. Data Science will inevitably need to jump through intricate compliance hoops that could also sound the drum of a new ethical data dawn, in light of globalisation. Or... it might not.
The document discusses information privacy and the General Data Protection Regulation (GDPR). It defines privacy as the right to be left alone and information privacy as the right to control how personal information is collected and used. Personal data is defined under GDPR as any information related to an identifiable individual. GDPR, approved in 2016, harmonizes data privacy laws across Europe and gives EU citizens control over their personal data and how organizations approach data privacy. The document outlines rights users have over their personal data under GDPR and expectations companies must meet, including obtaining consent, reporting data breaches, appointing data protection officers, and conducting privacy impact assessments.
This document summarizes a research paper that examines the effectiveness of international organizations, focusing on Save the Children, in protecting child rights in Hargeisa, Somaliland. It conducted interviews and focus groups with children, community members, government officials, and staff from Save the Children and other organizations. The research found complications in child protection enforcement due to gaps in the legal system and issues of impunity, corruption, and clan influence. It concluded that child rights protection needs radical interventions with high transparency and accountability in human rights.
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
This is an article/blog on the Privacy Symposium Africa 2022 on Privacy Rights and Digital rights as Human Rights. It also talks about Online Gender Based Violence , this is gender based violence that manifests in the Digital Space and Online world ie; phishing, non-consensual sharing, harrassment. This article explains why Privacy rights are essential in the modern world.
This document summarizes several comprehensive legal research websites that provide information for legal professionals, students, and the general public. It describes the key features and resources available on websites such as Findlaw, Justia, HeirosGamos, Cornell Law School's Legal Information Institute, Washlaw, the Law Library of Congress, and LawyerExpress. These sites offer links to primary and secondary legal sources, case law, legal news, blogs, practice tools, and international law databases. Resources include things like annotations to the U.S. Constitution, citation examples, dictionaries, state-specific information, and subject indexes.
Brussels data science - Privacy Engineering for Big Data & Data ScienceAurélie Pols
This presentation walks through the challenges and opportunities for data scientists and big data professionals, with a focus on Privacy, describing which future roles will be needed in order to successfully bridge the written word of the law with coded data trails. Data Science will inevitably need to jump through intricate compliance hoops that could also sound the drum of a new ethical data dawn, in light of globalisation. Or... it might not.
The document discusses information privacy and the General Data Protection Regulation (GDPR). It defines privacy as the right to be left alone and information privacy as the right to control how personal information is collected and used. Personal data is defined under GDPR as any information related to an identifiable individual. GDPR, approved in 2016, harmonizes data privacy laws across Europe and gives EU citizens control over their personal data and how organizations approach data privacy. The document outlines rights users have over their personal data under GDPR and expectations companies must meet, including obtaining consent, reporting data breaches, appointing data protection officers, and conducting privacy impact assessments.
This document summarizes a research paper that examines the effectiveness of international organizations, focusing on Save the Children, in protecting child rights in Hargeisa, Somaliland. It conducted interviews and focus groups with children, community members, government officials, and staff from Save the Children and other organizations. The research found complications in child protection enforcement due to gaps in the legal system and issues of impunity, corruption, and clan influence. It concluded that child rights protection needs radical interventions with high transparency and accountability in human rights.
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
This is an article/blog on the Privacy Symposium Africa 2022 on Privacy Rights and Digital rights as Human Rights. It also talks about Online Gender Based Violence , this is gender based violence that manifests in the Digital Space and Online world ie; phishing, non-consensual sharing, harrassment. This article explains why Privacy rights are essential in the modern world.
This document discusses several key aspects of privacy and how they relate to computer technology. It begins by defining privacy and information privacy. It then examines how computer technologies like databases, cameras, social media, and location tracking have changed people's ability to access and use personal information. It outlines several privacy threats like intentional and unauthorized use of data, data theft, and inadvertent information leakage. The document also explores new risks from tools like surveillance, data analysis, cloud computing and vulnerabilities in data security. It discusses how personal information can now be gathered invisibly through things like cookies and device fingerprints. Key issues discussed include secondary use of data, data mining/matching/profiling and identity theft. The document concludes by examining principles of informed
2014-04-16 Protection of Personal Information Act Readiness WorkshopPaul Jacobson
These are my slides for my presentation at the Protection of Personal Information Act Readiness Workshop at the OR Tambo Protea Hotel on 16 April 2014. My focus was on understanding data processing constraints; identifying key risk areas and the benefits of better data protection frameworks.
Key Issues on the new General Data Protection RegulationOlivier Vandeputte
The General Data Protection Regulation is one of the most wide ranging pieces of legislation passed by the EU in recent years. The GDPR comes into effect on 25 May 2018. The new framework is ambitious, complex and strict. It presents any organization that has so far failed to begin preparations with a steep challenge to become GDPR compliant in time.
We have summarized the key issues in our GDPR brochure.
This document discusses responsible data practices. It emphasizes balancing responsible data use, transparency and accountability, and data privacy and security. It outlines key areas like the data lifecycle, risks, and privacy laws like GDPR. Examples are given of challenges organizations like CARE, Girl Effect and Grameen face around data strategy, governance, consent and protecting vulnerable groups. The last section focuses on responsible data, including a maturity model and details on consent, lawful bases for processing data, and clearly communicating data practices to individuals.
The document discusses how the General Data Protection Regulation (GDPR) affects organizations collecting equal opportunities monitoring data. It states that GDPR allows organizations to continue collecting protected characteristics data for equal opportunities monitoring as it is a legal basis for processing. However, GDPR introduces stricter controls on sensitive personal data to protect privacy and safety. Organizations must establish lawful basis to process equal opportunities data and allow individuals to opt out of having their data processed. Completely anonymized equal opportunities data is not subject to GDPR.
This document summarizes a workshop on privacy and missing persons in natural disasters. It discusses key definitions and privacy aspects related to missing persons data. It analyzes major privacy issues for data controllers, including issues around data collection, use and individual rights. It provides options for organizations involved in missing persons efforts and for policymakers, such as guidance from data protection authorities, to help address privacy concerns in natural disasters.
2014-09-18 Protection of Personal Information Act readiness workshopPaul Jacobson
This document discusses key principles of data protection from South Africa's Protection of Personal Information Act (POPI), including lawful processing of personal information, consent requirements, and security safeguards. It emphasizes the responsibilities of data controllers and operators to protect personal data through transparency, proper purpose and retention of data, compliance with privacy policies, and implementing security measures. The document provides examples and guidance on how organizations can achieve POPI compliance.
3D's: Dating, Deception and Data Portability | Mozfest 2019Ian Forrester
This document discusses dating, data portability, and deception in the context of GDPR. It begins by providing background on the author's experience with online dating sites. It then shows snippets of personal data exported from OkCupid and Plenty of Fish in response to a GDPR data access request. The document raises concerns about what personal data dating sites collect and how it could be used for deception. It explores how data portability under GDPR may support innovation but has limitations. Finally, it proposes an exercise for the group to imagine new services using dating profile data in competitive, complementary, and unrelated ways.
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...Andrew Cannon
A detailed report on the results from GRBN's 24 country global survey on the issue of Trust & Personal Data. The report dives into how the level of familiarity with the issue as well as the level of concern about the abuse of personal data varies across the globe. The report compares how trustworthy people consider different types of both public and private organisations to be, and looks at how sensitive people consider different types of personal data to be.
Presentation by Aurélie Pols at Superweek Hungary 2014. This presentation is NOT about security and goes beyond the over-blown cookie debate in order to highlight how the upcoming EU Personal Data Protection Regulation will influence digital analytics to hopefully start embracing Privacy by Design ways of working.
NAZALI provides legal and technical services related to data protection, privacy, and cybersecurity in Turkey. The passage discusses Turkey's Personal Data Protection Law no. 6698 and the obligations it places on organizations that process personal data. NAZALI assists companies with compliance activities like conducting data inventories, reviewing policies and contracts, employee training, and responding to data requests or breaches.
This document discusses privacy concerns related to how personal data is collected and used online. It notes that many companies and governments collect extensive personal information from individuals through various online and offline sources without proper limitations or oversight. There are also concerns that collected data is not adequately protected, may be shared more broadly than users expect, and does not allow users to fully delete or correct their information. Overall, the document argues that individuals should have more transparency and control over their personal data and privacy.
AI Roles and Risk for election year 2024Aurélie Pols
Are we replacing one tyranny for another? reflexion on 10 years at Superweek, which challenges lie ahead for the digital analytics community this election year as the ink is slowly but surely drying on the AI Act.
Preparing for the AI Act - 5 years into GDPR enforcementAurélie Pols
Starting off from a recent fine from the Berlin Beauftragte für Datenschutz und Informationsfreiheit (BlnBDI) around obligations for automated decision making (art. 22 of the GDPR), this presentation will walk the audience through how teams collaborate around compliance obligations. Risk with respect to processing of personal data continues to increase since the ink dried on the GDPR in 2016. Enforcement as of 2018 has signaled a need for companies to act responsibly with their data processing operations. While data governance is surely not the sexist job of the XXI st century and data self-service is on everybody’s mind, the increased complexity of integrated data systems requires collaboration. You possibly know who your companies’ data protection officer is. Or not. Let’s talk about who could be responsible for what, how privacy-by-design consensus can be reached and where technology plays a role in preparing for an accountable, increasingly automated and risk mitigated, future.
Creative destruction & Privacy Whitewashing: where does risk lie? Aurélie Pols
Almost 5 years into GDPR enforcement, the courts and the supervisory authorities have peddled through quite some decisions and more are expected while this description is being written.
More importantly, privacy legislations globally continue to evolve, some at state levels while entire continents are taking a stance, enclosing positions on Competition, obligations for Platforms, also called Gatekeepers, and uses of ADM, ML or even AI. This presentation will highlight where risks lie for your company and what compliance should start to look like moving forward.
ePrivacy Directive, a 10 steps framework to be as compliant as possible for m...Aurélie Pols
1. The document outlines a 10-step plan for companies to audit their digital properties and become compliant with the ePrivacy Directive regarding cookies and trackers.
2. It advises scanning websites and apps to identify cookies, pixels and trackers, then working with marketing to decide which to keep or remove. Consent mechanisms may need to be established for some trackers.
3. The classification of cookies and whether consent is needed can depend on how tools are configured, and the broader context is how data is used for direct marketing and lead generation.
IAPP - Skills For Minimizing Privacy Risk in Data Science Product and Service...Aurélie Pols
The document discusses the need for data scientists to develop stronger privacy skills and knowledge. It notes that while most data scientists accept the importance of privacy, the profession overall lacks in-depth understanding of privacy principles and regulations. As data science tools are used for more high-risk applications and public concern over data privacy grows, it is essential for data scientists to learn about privacy challenges and solutions. The document provides a knowledge map to help data scientists and organizations assess privacy skill levels and identify training needs for different roles.
This document introduces Aurelie Pols, a data governance and privacy engineer. It provides details about her work experience, including currently serving as the DPO for mParticle and founding her own firm, Aurelie Pols & Associates. The document discusses her views that data has become the new infrastructure, privacy the new environmental issue, and trust the new currency. It outlines her perspective that balancing solving problems, sharing knowledge, and building the future are the three pillars of a balanced career.
For Superweek 2022: discussing risk using IAB's TCFAurélie Pols
This document discusses the legality of real-time bidding (RTB) under GDPR and who bears the risk of non-compliance. It notes that RTB involves broadcasting personal data internationally to various entities without ensuring proper deletion or purpose limitations. This violates GDPR principles. While the IAB claims its transparency and consent framework addresses this, investigations found ongoing issues. The document argues RTB likely violates GDPR and publishers may ultimately be responsible as data controllers, though determining clear liability is difficult given interlocking obligations of many involved parties. Education is needed on privacy risks to help achieve compliance.
Interoperability in Digital will take a Global VillageAurélie Pols
It's a never ending game of whack-a-mole, where Peter Swire already talked about technological escalation wars back in 2012 when chairing the W3C DNT efforts.
It used to be "it's not PII hence privacy legislation doesn't apply". The scope of action with respect to data privacy legislation has broadened, on both sides of the Atlantic.
Yet similar dodging techniques are now also being applied to actual existing and enforced legislation. Under the CCPA, the California Consumer Privacy Act, it's about not going beyond 25 million $ a year in revenue, avoiding employee data and this US based legislation not being applicable to governmental institutions (hail to surveillance capitalism fed by public authorities!).
We've long talked about ePrivacy being unclear while the legislator does move towards applying the GDPR also to digital data.
Those are the legislative loopholes but then also come the technical techniques Simo is going to talk about as we both come to the same conclusion: players are influencing the data, possibly seeing a way to compete not on analytics but on privacy?
As companies, even US based ones such as Apple and Microsoft, recognise privacy to be a fundamental right, let's explore which risks companies are facing and what some of the emerging best practices could look like.
Contenu connexe
Similaire à The Data Subject First? Decoding the GDPR at StrataData
This document discusses several key aspects of privacy and how they relate to computer technology. It begins by defining privacy and information privacy. It then examines how computer technologies like databases, cameras, social media, and location tracking have changed people's ability to access and use personal information. It outlines several privacy threats like intentional and unauthorized use of data, data theft, and inadvertent information leakage. The document also explores new risks from tools like surveillance, data analysis, cloud computing and vulnerabilities in data security. It discusses how personal information can now be gathered invisibly through things like cookies and device fingerprints. Key issues discussed include secondary use of data, data mining/matching/profiling and identity theft. The document concludes by examining principles of informed
2014-04-16 Protection of Personal Information Act Readiness WorkshopPaul Jacobson
These are my slides for my presentation at the Protection of Personal Information Act Readiness Workshop at the OR Tambo Protea Hotel on 16 April 2014. My focus was on understanding data processing constraints; identifying key risk areas and the benefits of better data protection frameworks.
Key Issues on the new General Data Protection RegulationOlivier Vandeputte
The General Data Protection Regulation is one of the most wide ranging pieces of legislation passed by the EU in recent years. The GDPR comes into effect on 25 May 2018. The new framework is ambitious, complex and strict. It presents any organization that has so far failed to begin preparations with a steep challenge to become GDPR compliant in time.
We have summarized the key issues in our GDPR brochure.
This document discusses responsible data practices. It emphasizes balancing responsible data use, transparency and accountability, and data privacy and security. It outlines key areas like the data lifecycle, risks, and privacy laws like GDPR. Examples are given of challenges organizations like CARE, Girl Effect and Grameen face around data strategy, governance, consent and protecting vulnerable groups. The last section focuses on responsible data, including a maturity model and details on consent, lawful bases for processing data, and clearly communicating data practices to individuals.
The document discusses how the General Data Protection Regulation (GDPR) affects organizations collecting equal opportunities monitoring data. It states that GDPR allows organizations to continue collecting protected characteristics data for equal opportunities monitoring as it is a legal basis for processing. However, GDPR introduces stricter controls on sensitive personal data to protect privacy and safety. Organizations must establish lawful basis to process equal opportunities data and allow individuals to opt out of having their data processed. Completely anonymized equal opportunities data is not subject to GDPR.
This document summarizes a workshop on privacy and missing persons in natural disasters. It discusses key definitions and privacy aspects related to missing persons data. It analyzes major privacy issues for data controllers, including issues around data collection, use and individual rights. It provides options for organizations involved in missing persons efforts and for policymakers, such as guidance from data protection authorities, to help address privacy concerns in natural disasters.
2014-09-18 Protection of Personal Information Act readiness workshopPaul Jacobson
This document discusses key principles of data protection from South Africa's Protection of Personal Information Act (POPI), including lawful processing of personal information, consent requirements, and security safeguards. It emphasizes the responsibilities of data controllers and operators to protect personal data through transparency, proper purpose and retention of data, compliance with privacy policies, and implementing security measures. The document provides examples and guidance on how organizations can achieve POPI compliance.
3D's: Dating, Deception and Data Portability | Mozfest 2019Ian Forrester
This document discusses dating, data portability, and deception in the context of GDPR. It begins by providing background on the author's experience with online dating sites. It then shows snippets of personal data exported from OkCupid and Plenty of Fish in response to a GDPR data access request. The document raises concerns about what personal data dating sites collect and how it could be used for deception. It explores how data portability under GDPR may support innovation but has limitations. Finally, it proposes an exercise for the group to imagine new services using dating profile data in competitive, complementary, and unrelated ways.
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...Andrew Cannon
A detailed report on the results from GRBN's 24 country global survey on the issue of Trust & Personal Data. The report dives into how the level of familiarity with the issue as well as the level of concern about the abuse of personal data varies across the globe. The report compares how trustworthy people consider different types of both public and private organisations to be, and looks at how sensitive people consider different types of personal data to be.
Presentation by Aurélie Pols at Superweek Hungary 2014. This presentation is NOT about security and goes beyond the over-blown cookie debate in order to highlight how the upcoming EU Personal Data Protection Regulation will influence digital analytics to hopefully start embracing Privacy by Design ways of working.
NAZALI provides legal and technical services related to data protection, privacy, and cybersecurity in Turkey. The passage discusses Turkey's Personal Data Protection Law no. 6698 and the obligations it places on organizations that process personal data. NAZALI assists companies with compliance activities like conducting data inventories, reviewing policies and contracts, employee training, and responding to data requests or breaches.
This document discusses privacy concerns related to how personal data is collected and used online. It notes that many companies and governments collect extensive personal information from individuals through various online and offline sources without proper limitations or oversight. There are also concerns that collected data is not adequately protected, may be shared more broadly than users expect, and does not allow users to fully delete or correct their information. Overall, the document argues that individuals should have more transparency and control over their personal data and privacy.
Similaire à The Data Subject First? Decoding the GDPR at StrataData (14)
AI Roles and Risk for election year 2024Aurélie Pols
Are we replacing one tyranny for another? reflexion on 10 years at Superweek, which challenges lie ahead for the digital analytics community this election year as the ink is slowly but surely drying on the AI Act.
Preparing for the AI Act - 5 years into GDPR enforcementAurélie Pols
Starting off from a recent fine from the Berlin Beauftragte für Datenschutz und Informationsfreiheit (BlnBDI) around obligations for automated decision making (art. 22 of the GDPR), this presentation will walk the audience through how teams collaborate around compliance obligations. Risk with respect to processing of personal data continues to increase since the ink dried on the GDPR in 2016. Enforcement as of 2018 has signaled a need for companies to act responsibly with their data processing operations. While data governance is surely not the sexist job of the XXI st century and data self-service is on everybody’s mind, the increased complexity of integrated data systems requires collaboration. You possibly know who your companies’ data protection officer is. Or not. Let’s talk about who could be responsible for what, how privacy-by-design consensus can be reached and where technology plays a role in preparing for an accountable, increasingly automated and risk mitigated, future.
Creative destruction & Privacy Whitewashing: where does risk lie? Aurélie Pols
Almost 5 years into GDPR enforcement, the courts and the supervisory authorities have peddled through quite some decisions and more are expected while this description is being written.
More importantly, privacy legislations globally continue to evolve, some at state levels while entire continents are taking a stance, enclosing positions on Competition, obligations for Platforms, also called Gatekeepers, and uses of ADM, ML or even AI. This presentation will highlight where risks lie for your company and what compliance should start to look like moving forward.
ePrivacy Directive, a 10 steps framework to be as compliant as possible for m...Aurélie Pols
1. The document outlines a 10-step plan for companies to audit their digital properties and become compliant with the ePrivacy Directive regarding cookies and trackers.
2. It advises scanning websites and apps to identify cookies, pixels and trackers, then working with marketing to decide which to keep or remove. Consent mechanisms may need to be established for some trackers.
3. The classification of cookies and whether consent is needed can depend on how tools are configured, and the broader context is how data is used for direct marketing and lead generation.
IAPP - Skills For Minimizing Privacy Risk in Data Science Product and Service...Aurélie Pols
The document discusses the need for data scientists to develop stronger privacy skills and knowledge. It notes that while most data scientists accept the importance of privacy, the profession overall lacks in-depth understanding of privacy principles and regulations. As data science tools are used for more high-risk applications and public concern over data privacy grows, it is essential for data scientists to learn about privacy challenges and solutions. The document provides a knowledge map to help data scientists and organizations assess privacy skill levels and identify training needs for different roles.
This document introduces Aurelie Pols, a data governance and privacy engineer. It provides details about her work experience, including currently serving as the DPO for mParticle and founding her own firm, Aurelie Pols & Associates. The document discusses her views that data has become the new infrastructure, privacy the new environmental issue, and trust the new currency. It outlines her perspective that balancing solving problems, sharing knowledge, and building the future are the three pillars of a balanced career.
For Superweek 2022: discussing risk using IAB's TCFAurélie Pols
This document discusses the legality of real-time bidding (RTB) under GDPR and who bears the risk of non-compliance. It notes that RTB involves broadcasting personal data internationally to various entities without ensuring proper deletion or purpose limitations. This violates GDPR principles. While the IAB claims its transparency and consent framework addresses this, investigations found ongoing issues. The document argues RTB likely violates GDPR and publishers may ultimately be responsible as data controllers, though determining clear liability is difficult given interlocking obligations of many involved parties. Education is needed on privacy risks to help achieve compliance.
Interoperability in Digital will take a Global VillageAurélie Pols
It's a never ending game of whack-a-mole, where Peter Swire already talked about technological escalation wars back in 2012 when chairing the W3C DNT efforts.
It used to be "it's not PII hence privacy legislation doesn't apply". The scope of action with respect to data privacy legislation has broadened, on both sides of the Atlantic.
Yet similar dodging techniques are now also being applied to actual existing and enforced legislation. Under the CCPA, the California Consumer Privacy Act, it's about not going beyond 25 million $ a year in revenue, avoiding employee data and this US based legislation not being applicable to governmental institutions (hail to surveillance capitalism fed by public authorities!).
We've long talked about ePrivacy being unclear while the legislator does move towards applying the GDPR also to digital data.
Those are the legislative loopholes but then also come the technical techniques Simo is going to talk about as we both come to the same conclusion: players are influencing the data, possibly seeing a way to compete not on analytics but on privacy?
As companies, even US based ones such as Apple and Microsoft, recognise privacy to be a fundamental right, let's explore which risks companies are facing and what some of the emerging best practices could look like.
The GDPR is here. So do you know what the courts are saying?Aurélie Pols
This document discusses court rulings related to the GDPR and privacy. It begins by noting there has not been much litigation around data protection yet, with notable cases including challenges to data retention directives and invalidation of the EU-US Safe Harbor agreement. Two typical types of cases before the European Court of Justice are discussed - those balancing public vs. individual interests, and those interpreting secondary EU law to foster accountability. Upcoming cases are mentioned that could address issues like joint responsibility of controllers and processors and validity of consent mechanisms. Processor obligations under the GDPR are also outlined.
CPDP: Data ownership, Innovation and Privacy: looking for an approach on both...Aurélie Pols
In a democratic society, it is always essential to search for the mechanisms contributing to a greater protection of citizens’ fundamental rights. For years we have been witnessing a debate, on both sides of the Atlantic, about the relevance of the formulation of a right of ownership of personal data.
It is interesting to analyse how the creation of this new right has different implications in different legal systems. In this panel we will consider the following questions:
- Can the right of ownership of personal data contribute to reinforcing the right to data protection and the right to privacy?
- What would be the impact of the formulation of a right of ownership of personal data in the field of data-driven innovation?
- Can this right contribute to the development of technological innovations based on data?
- Can the vision based on a property right in our personal data fit in a context of the defence of a fundamental right in our democratic societies?
- Can personal data be an asset that may be subject to commercial and / or economic operations?
- Is the legal view about data ownership shared on both sides of the Atlantic?
Video of the entire panel here: https://www.youtube.com/watch?v=YA8kMGM_kWU
GDPR and the aftermath: what are we building towards?Aurélie Pols
“Human dignity is inviolable. It must be respected and protected.” is stated within article 1 of the Charter of Fundamental Rights of the EU. This document is the result of historical evolutions in the rule of law with respect to human rights, originating in 1948 with the Declaration of Human Rights and the creation of the United Nations.
Today we face global challenges, where sovereignties and personal identities are challenged, amongst others, through digitalization. The foundational values that touch upon our own dignity, as well as those of the tribes we belong to, need to be redefined in order to assure we build the societies we can proudly pass onto our children.
2018 is undoubtedly the year of Ethics. Which values should digital ethics reflect, beyond article 1 of the Charter of Fundamental Rights of the EU to assure we all move forward in the same direction?
Who Goes There? Demystifying Digital Identity for All (1/2)Aurélie Pols
Who goes there? It’s a question as old as time that is asked at the beginning of most transactions. In order for people and organizations to do business they must first ask – Who are you? How can I trust you?
Digital identity is becoming the most important challenge to solve at the intersection of people, process, and technology. Ask people about digital identity and they might think of a password and user ID to access services. But it’s much more. Digital identity is the digital representation of you – the Facebook you, Twitter you, and Google you.
Why is digital identity challenging? Perhaps because digital identity must intertwine with existing and evolving governance and cultural norms. Notions of privacy and sharing can vary greatly from person to person and from culture to culture.
This workshop explores what it means to be you in the digital world. We’ll uncover the forces and influences that impact the digital you – for better or for worse. Attendees will gain introductory insights about how digital identities and digital relationships connect and interact within a society. Join us to learn how Canada will advance digital identity for the socio-economic good of all.
https://fwd50.com/session/demystifying-digital-identity-for-all-1-2/
How digitization challenges our values as citizens Aurélie Pols
Aurélie will be talking about how our cherished European values that we strive to pass onto our children are being challenged through increased access to information and digitisation.
She will examine out responsibility as data subjects, citizens and parents to assure technology works for the benefit of human beings in the long run. We know that the processing of personal data should be designed to serve mankind - but what could that mean for us today and for the next generation to come?
Technical Consequences of the Data Subject's RightsAurélie Pols
In her keynote speech Aurélie will focus on data subject's rights and the technical consequences of these obligations.
As the General Data Protection Regulation (GDPR) has come into force on May 25th 2018, data subject’s rights are being re-introduced and reinforced, building the ground work for a more balanced approaches towards data uses within our increasingly digitised societies.
Aurélie dives into the practical perspective of how to manage these new GDPR data subject rights, what it means for your processes and IT systems and when or to what type of data they apply.
From GDPR to ePrivacy: what does it mean to the advertising sector?Aurélie Pols
The GDPR which comes into force in May 2018 includes 6 ways to assure lawfulness of processing, of which consent
and legitimate interests. The ePrivacy Regulation, a lex specialis of the GDPR, remains in draft mode, waiting for trialogue.
This presentation will explain what a risk based approach means for the advertising sector, taking the angle of media and
communication agencies, vendors of tools as well as their end clients, the advertisers.
State of EU legislation: GDPR & ePrivacy for SuperweekAurélie Pols
Building on 3 years worth of presentations on Privacy in the digital data ecosystem for Superweek, tackling transparency and sensitive data, this one addresses data subject rights while grounding the European project into the Charter of Fundamental Rights of the European Union. It includes a word of caution with respect to legitimate interests: not an easy choice to uphold!
The Great GDPR MyData Debate - Aurelie Pols - KeynoteAurélie Pols
The GDPR empowers citizens with several fundamentally new rights. This session will summarise some of those new rights with an exciting keynote and three supporting presentations. In particular we will discuss the various implementation opportunities, technical and legal challenges and form a view on how these new rights should manifest for a mydata economy. We will then enter an audience participatory debate led by the speaker panel and your GDPR Mydata hosts, finalised with 4 key questions the debate has surfaced and poll the audience views on the most likely market solutions.
https://mydata2017.org/session/gdpr-debate/
This document discusses Aurelie Pols, a data governance and privacy advocate. It provides her background and credentials, which include being a data protection advocate at Krux Digital, serving on the Ethics Advisory Group for the European Data Protection Supervisor, and being a professor on ethics and privacy topics. It also shares several of her tweets on topics like privacy engineering, ethical foundations for regulation, the parties involved in data privacy, and provocative statements about data as a new kind of property.
Data Privacy & Protection Conference - Unlocking the Value of Digital Ethics
Boussias communication presentation, Athens June 23rd 2016 http://dataprivacy.boussiasconferences.gr/default.asp?pid=12&la=1&SpeakerId=1
What are the common challenges faced by women lawyers working in the legal pr...lawyersonia
The legal profession, which has historically been male-dominated, has experienced a significant increase in the number of women entering the field over the past few decades. Despite this progress, women lawyers continue to encounter various challenges as they strive for top positions.
The Future of Criminal Defense Lawyer in India.pdfveteranlegal
https://veteranlegal.in/defense-lawyer-in-india/ | Criminal defense Lawyer in India has always been a vital aspect of the country's legal system. As defenders of justice, criminal Defense Lawyer play a critical role in ensuring that individuals accused of crimes receive a fair trial and that their constitutional rights are protected. As India evolves socially, economically, and technologically, the role and future of criminal Defense Lawyer are also undergoing significant changes. This comprehensive blog explores the current landscape, challenges, technological advancements, and prospects for criminal Defense Lawyer in India.
Business law for the students of undergraduate level. The presentation contains the summary of all the chapters under the syllabus of State University, Contract Act, Sale of Goods Act, Negotiable Instrument Act, Partnership Act, Limited Liability Act, Consumer Protection Act.
Genocide in International Criminal Law.pptxMasoudZamani13
Excited to share insights from my recent presentation on genocide! 💡 In light of ongoing debates, it's crucial to delve into the nuances of this grave crime.
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaintsseoglobal20
Our company bridges the gap between registered users and experienced advocates, offering a user-friendly online platform for seamless interaction. This platform empowers users to voice their grievances, particularly regarding online consumer issues. We streamline support by utilizing our team of expert advocates to provide consultancy services and initiate appropriate legal actions.
Our Online Consumer Legal Forum offers comprehensive guidance to individuals and businesses facing consumer complaints. With a dedicated team, round-the-clock support, and efficient complaint management, we are the preferred solution for addressing consumer grievances.
Our intuitive online interface allows individuals to register complaints, seek legal advice, and pursue justice conveniently. Users can submit complaints via mobile devices and send legal notices to companies directly through our portal.
Lifting the Corporate Veil. Power Point Presentationseri bangash
"Lifting the Corporate Veil" is a legal concept that refers to the judicial act of disregarding the separate legal personality of a corporation or limited liability company (LLC). Normally, a corporation is considered a legal entity separate from its shareholders or members, meaning that the personal assets of shareholders or members are protected from the liabilities of the corporation. However, there are certain situations where courts may decide to "pierce" or "lift" the corporate veil, holding shareholders or members personally liable for the debts or actions of the corporation.
Here are some common scenarios in which courts might lift the corporate veil:
Fraud or Illegality: If shareholders or members use the corporate structure to perpetrate fraud, evade legal obligations, or engage in illegal activities, courts may disregard the corporate entity and hold those individuals personally liable.
Undercapitalization: If a corporation is formed with insufficient capital to conduct its intended business and meet its foreseeable liabilities, and this lack of capitalization results in harm to creditors or other parties, courts may lift the corporate veil to hold shareholders or members liable.
Failure to Observe Corporate Formalities: Corporations and LLCs are required to observe certain formalities, such as holding regular meetings, maintaining separate financial records, and avoiding commingling of personal and corporate assets. If these formalities are not observed and the corporate structure is used as a mere façade, courts may disregard the corporate entity.
Alter Ego: If there is such a unity of interest and ownership between the corporation and its shareholders or members that the separate personalities of the corporation and the individuals no longer exist, courts may treat the corporation as the alter ego of its owners and hold them personally liable.
Group Enterprises: In some cases, where multiple corporations are closely related or form part of a single economic unit, courts may pierce the corporate veil to achieve equity, particularly if one corporation's actions harm creditors or other stakeholders and the corporate structure is being used to shield culpable parties from liability.
Corporate Governance : Scope and Legal Frameworkdevaki57
CORPORATE GOVERNANCE
MEANING
Corporate Governance refers to the way in which companies are governed and to what purpose. It identifies who has power and accountability, and who makes decisions. It is, in essence, a toolkit that enables management and the board to deal more effectively with the challenges of running a company.
सुप्रीम कोर्ट ने यह भी माना था कि मजिस्ट्रेट का यह कर्तव्य है कि वह सुनिश्चित करे कि अधिकारी पीएमएलए के तहत निर्धारित प्रक्रिया के साथ-साथ संवैधानिक सुरक्षा उपायों का भी उचित रूप से पालन करें।