SlideShare a Scribd company logo
Balancing Privacy and Digitization
Maintaining privacy in and increasingly digitized environment
1
My Data, What?!?
2
Data Breaches
Everywhere!
3
What data?
Data about you
• Name
• Nationality/Residency
• Age
• Likes and Dislikes
• Relatives
• Associates
• Medical Information
• Etc.
Data about what you do
• Location/Travel (history and
current)
• Frequent websites/apps
• Entertainment you like
(music, movies,
parties/events, etc.)
• Voice
4
Digitization
5
What is it?
Digitization • Is the process of moving to a digital
business
• It is the use of digital technologies
to change a business model and
provide new revenue and value-
producing opportunities
*Gartner.com
6
Data as an Asset
• Data isn’t just information on customers
anymore
• Assets can be used to make money
• Assets can be used to acquire more
assets
• Data informs decisions
Acquire
Curate
EnhanceAnalyze
Monetize
7
Privacy
8
What is it?
Privacy • (IT) what data can be shared
with a third party
• Being free from unwanted or
undue intrusion or disturbance
in one’s private life
*TechTarget.com
*Dictionary.com
9
Threats and Risks to Privacy
• Web Tracking
• Data Collections
• Lack of Security
• Connected Everything – IoT
• Public/Free Wi-Fi
• Social Networking
• Social Engineering
Threats:
• Discrimination
• Disclosure of Information
• Lack of Anonymity
• Movement of Data
Risks:
10
What Laws Are There To Protect Privacy?
• The Jamaican Constitution, The
Charter of Fundamental Rights
and Freedoms – Chapter 3
• The International Covenant on
Civil and Political Rights (ICCPR)
– Article 17
Local Laws
• General Data Protection
Regulation (GDPR) - EU
• The Data Protection Act – UK
• Personal Information Protection
Act – Bermuda
• Data Protection Law - Cayman
Islands
International/Regional Laws
11
The Balance
12
Can We Really Have Privacy?
Individuals Companies|
13
Awareness is Key
14
Understand the laws that protect/guide you
Understand what you are signing/agreeing to |
your obligations to customers
Understand the technology you are using
Ensure your technology is up to date
Companies Using Data
*Gartner.com
15
Advancing Business Insights With Privacy in Mind
Privacy
Systems
Analytics
Laws
People
16
How Does Your Company Use Data?
17
Process
Perform some assessment or
transformation of data
Control
Collect and store
data and may
process data
None
Manual business,
paper based
business
*GDPR
Even More Analytics
18
Identify
• Map data on customers
• Create flags
Classify
• Region/Jurisdiction
• Exemption/Do not process
Action
• Update existing analytics
• Educate and enforce
What else can we do?
19
Define what a breach is
Develop communication strategy
Update policies
Prepare/Update privacy clauses
Prepare privacy request processes
Thank you Q&A
20
Sources
• https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-
breaches-of-the-21st-century.html
• https://www.gartner.com/it-glossary/digitalization/
• https://searchdatamanagement.techtarget.com/definition/privacy
• http://www.dictionary.com/browse/privacy
• https://www.pocket-lint.com/apps/news/143404-7-biggest-privacy-threats-
online
• https://searchsecurity.techtarget.com/tip/A-look-at-the-key-GDPR-
requirements-and-how-to-meet-
them?src=5737362&asrc=EM_ERU_94056887&utm_content=eru-rd2-
rcpE&utm_medium=EM&utm_source=ERU&utm_campaign=20180426_ERU
%20Transmission%20for%2004/26/2018%20(UserUniverse:%202572767)
21

More Related Content

PPT
Websites: do you tick all the boxes?
PDF
Data protection compliance for tech startups
PDF
Data Protection and Privacy
PPTX
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
PPTX
Online privacy
PDF
Data & Security for the Internet of Things
PPT
Consumer Privacy
PPT
Data protection
Websites: do you tick all the boxes?
Data protection compliance for tech startups
Data Protection and Privacy
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
Online privacy
Data & Security for the Internet of Things
Consumer Privacy
Data protection

What's hot (18)

PPTX
European GDPR for Good Technology Collective (GTC)
PPTX
Data Privacy Introduction
PDF
Legal update
PDF
GDPR - Sink or Swim
PPTX
GDPR Breakfast Briefing for Business Advisors
PPT
DPA seminar presentation
PPT
Personal privacy and computer technologies
PPTX
GDPR Breakfast Briefing for Business Advisors
PPTX
Get you and your business GDPR ready
PDF
Exploring GDPR
PPTX
Preparing for GDPR: What Every B2B Marketer Must Know
PPTX
GDPR From Implementation to Opportunity
PPTX
Changing legislation – General Data Protection Regulation (GDPR) and librarie...
PPTX
Current Privacy and Data Issues (for people who care about open data!)
PPT
Privacy and Data Security: Risk Management and Avoidance
PPTX
Data Privacy
PDF
Gdpr in a nutshell
PPTX
What does GDPR mean for your charity?
European GDPR for Good Technology Collective (GTC)
Data Privacy Introduction
Legal update
GDPR - Sink or Swim
GDPR Breakfast Briefing for Business Advisors
DPA seminar presentation
Personal privacy and computer technologies
GDPR Breakfast Briefing for Business Advisors
Get you and your business GDPR ready
Exploring GDPR
Preparing for GDPR: What Every B2B Marketer Must Know
GDPR From Implementation to Opportunity
Changing legislation – General Data Protection Regulation (GDPR) and librarie...
Current Privacy and Data Issues (for people who care about open data!)
Privacy and Data Security: Risk Management and Avoidance
Data Privacy
Gdpr in a nutshell
What does GDPR mean for your charity?
Ad

Similar to Balancing Privacy and Digitization (20)

PPTX
GDPR in the Healthcare Industry
PDF
Preparing your Business for the Data Protection Bill
PPTX
Bridging the Gap Between Privacy and Retention
PPTX
GDPR and Cyber Security LW.pptx
PPTX
LW GDPR and Cyber Security.pptx
PDF
Scotland legal update 25 sept
PDF
Are Your Data Ready for GDPR? (with MAPR and Talend)
PPTX
What does GDPR mean for your business?
PDF
GDPR for your Payroll Bureau
PPTX
GDPR for Dummies
PPT
13687562.ppt
PPTX
5) How charities can protect themselves against data reform - ‘Emerging Digit...
PPTX
GDPR Practicalities - The Data Shed
PDF
Hivos and Responsible Data
PPTX
Chapter 3
PPTX
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
PPTX
Data_Privacy_Workshop_Presentation_Updated.pptx
PPTX
Privacy issues in data analytics
PPTX
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
PPTX
Ethics in Data Management.pptx
GDPR in the Healthcare Industry
Preparing your Business for the Data Protection Bill
Bridging the Gap Between Privacy and Retention
GDPR and Cyber Security LW.pptx
LW GDPR and Cyber Security.pptx
Scotland legal update 25 sept
Are Your Data Ready for GDPR? (with MAPR and Talend)
What does GDPR mean for your business?
GDPR for your Payroll Bureau
GDPR for Dummies
13687562.ppt
5) How charities can protect themselves against data reform - ‘Emerging Digit...
GDPR Practicalities - The Data Shed
Hivos and Responsible Data
Chapter 3
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
Data_Privacy_Workshop_Presentation_Updated.pptx
Privacy issues in data analytics
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Ethics in Data Management.pptx
Ad

More from Symptai Consulting Limited (18)

PPTX
Embracing the Risk and Opportunity of AI & Cloud.pptx
PDF
Migrating to the Cloud - From Preparation to Operation copy.pdf
PDF
Integrated Security for Software Development and Advanced Penetration Testing...
PDF
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
PDF
Keeping security relevant amid digital transformation
PPTX
Realizing the benefits of Digital Transformation
PDF
Securing Devices at Home
PPTX
Why cost optimization is the way of the future
PPTX
Best practices for PCI compliance
PPTX
The role of Technology: Battling Financial Crime
PPTX
Data Protection: An Approach to Privacy
PPTX
Data Analytics: Improving Business
PPTX
IT Audit - Evolve and Stay in the Game
PPTX
Misconceptions of Business Continuity Planning
PPTX
Cyber-Attack and Security: Putting the Audit Committee on High Alert
PPTX
Data mining: How it can Help Boost Effectiveness
PPTX
Can your company survive a modern day cyber attack?
PPTX
Governance: a tool for growth
Embracing the Risk and Opportunity of AI & Cloud.pptx
Migrating to the Cloud - From Preparation to Operation copy.pdf
Integrated Security for Software Development and Advanced Penetration Testing...
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Keeping security relevant amid digital transformation
Realizing the benefits of Digital Transformation
Securing Devices at Home
Why cost optimization is the way of the future
Best practices for PCI compliance
The role of Technology: Battling Financial Crime
Data Protection: An Approach to Privacy
Data Analytics: Improving Business
IT Audit - Evolve and Stay in the Game
Misconceptions of Business Continuity Planning
Cyber-Attack and Security: Putting the Audit Committee on High Alert
Data mining: How it can Help Boost Effectiveness
Can your company survive a modern day cyber attack?
Governance: a tool for growth

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Big Data Technologies - Introduction.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Electronic commerce courselecture one. Pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
KodekX | Application Modernization Development
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Spectroscopy.pptx food analysis technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Big Data Technologies - Introduction.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Unlocking AI with Model Context Protocol (MCP)
Electronic commerce courselecture one. Pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation_ Review paper, used for researhc scholars
KodekX | Application Modernization Development
Building Integrated photovoltaic BIPV_UPV.pdf
MYSQL Presentation for SQL database connectivity
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Weekly Chronicles - August'25 Week I
Spectroscopy.pptx food analysis technology
Empathic Computing: Creating Shared Understanding
Mobile App Security Testing_ A Comprehensive Guide.pdf
cuic standard and advanced reporting.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Advanced methodologies resolving dimensionality complications for autism neur...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

Balancing Privacy and Digitization

  • 1. Balancing Privacy and Digitization Maintaining privacy in and increasingly digitized environment 1
  • 4. What data? Data about you • Name • Nationality/Residency • Age • Likes and Dislikes • Relatives • Associates • Medical Information • Etc. Data about what you do • Location/Travel (history and current) • Frequent websites/apps • Entertainment you like (music, movies, parties/events, etc.) • Voice 4
  • 6. What is it? Digitization • Is the process of moving to a digital business • It is the use of digital technologies to change a business model and provide new revenue and value- producing opportunities *Gartner.com 6
  • 7. Data as an Asset • Data isn’t just information on customers anymore • Assets can be used to make money • Assets can be used to acquire more assets • Data informs decisions Acquire Curate EnhanceAnalyze Monetize 7
  • 9. What is it? Privacy • (IT) what data can be shared with a third party • Being free from unwanted or undue intrusion or disturbance in one’s private life *TechTarget.com *Dictionary.com 9
  • 10. Threats and Risks to Privacy • Web Tracking • Data Collections • Lack of Security • Connected Everything – IoT • Public/Free Wi-Fi • Social Networking • Social Engineering Threats: • Discrimination • Disclosure of Information • Lack of Anonymity • Movement of Data Risks: 10
  • 11. What Laws Are There To Protect Privacy? • The Jamaican Constitution, The Charter of Fundamental Rights and Freedoms – Chapter 3 • The International Covenant on Civil and Political Rights (ICCPR) – Article 17 Local Laws • General Data Protection Regulation (GDPR) - EU • The Data Protection Act – UK • Personal Information Protection Act – Bermuda • Data Protection Law - Cayman Islands International/Regional Laws 11
  • 13. Can We Really Have Privacy? Individuals Companies| 13
  • 14. Awareness is Key 14 Understand the laws that protect/guide you Understand what you are signing/agreeing to | your obligations to customers Understand the technology you are using Ensure your technology is up to date
  • 16. Advancing Business Insights With Privacy in Mind Privacy Systems Analytics Laws People 16
  • 17. How Does Your Company Use Data? 17 Process Perform some assessment or transformation of data Control Collect and store data and may process data None Manual business, paper based business *GDPR
  • 18. Even More Analytics 18 Identify • Map data on customers • Create flags Classify • Region/Jurisdiction • Exemption/Do not process Action • Update existing analytics • Educate and enforce
  • 19. What else can we do? 19 Define what a breach is Develop communication strategy Update policies Prepare/Update privacy clauses Prepare privacy request processes
  • 21. Sources • https://www.csoonline.com/article/2130877/data-breach/the-biggest-data- breaches-of-the-21st-century.html • https://www.gartner.com/it-glossary/digitalization/ • https://searchdatamanagement.techtarget.com/definition/privacy • http://www.dictionary.com/browse/privacy • https://www.pocket-lint.com/apps/news/143404-7-biggest-privacy-threats- online • https://searchsecurity.techtarget.com/tip/A-look-at-the-key-GDPR- requirements-and-how-to-meet- them?src=5737362&asrc=EM_ERU_94056887&utm_content=eru-rd2- rcpE&utm_medium=EM&utm_source=ERU&utm_campaign=20180426_ERU %20Transmission%20for%2004/26/2018%20(UserUniverse:%202572767) 21

Editor's Notes

  • #2: Welcome everyone Thank you for joining us today
  • #3: Very timely topic considering the EU’s General Data Protection Regulation (GDPR) and Cambridge Analytica’s data privacy issues currently in the news. As Information System Auditors/Data Analysts/Business Analysts here at Symptai – changes like this are important/interesting to us – Governance Previous examples of breaches…
  • #4: https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html image - https://imgflip.com/s/meme/X-Everywhere.jpg
  • #5: Pros and Cons
  • #7: https://www.gartner.com/it-glossary/digitalization/ Image - https://openclipart.org/detail/289225/clipboard-check Image - https://openclipart.org/detail/296351/desktop-computer-3
  • #8: KYC – Know Your Customer TRN – Tax Registration Number
  • #10: https://searchdatamanagement.techtarget.com/definition/privacy http://www.dictionary.com/browse/privacy
  • #11: https://www.pocket-lint.com/apps/news/143404-7-biggest-privacy-threats-online
  • #12: Data Subject’ s Right to: Know Prevent Processing Likely to Cause Damage or Distress Prevent Processing for Purposes of Direct Marketing Constrain Automated Decision Taking Rectification of Inaccuracies Data Controller Registration Appointment of Data Protection Officer Adherence to Processing Standards Data Protection Impact Assessment Prosecution, Penalties, Liabilities ICCPR - provides that no one shall be subjected to an arbitrary or unlawful interference with his or her privacy
  • #13: http://freevector.co/vector-icons/business/business-scale-with-a-man-and-resources-gears-symbol.html
  • #14: https://qph.fs.quoracdn.net/main-qimg-fab05bfbe22c6f8941c8a400efdd9135 https://www.cqse.eu/images/company/company-landscape.png
  • #19: 1 know what data you currently have on customers and what jurisdiction they belong to 2 flags can help to easily manage info on the data you do or do not have 3 know which laws apply to who 4 id  quickly and easily remove persons from analytics or even from system if requested 5 refine existing analytics using the map and flags and exemptions | do analytics assume too much  discrimination 6 educate customers and staff (personal and office data security) | have someone responsible (data protection officer) https://searchsecurity.techtarget.com/tip/A-look-at-the-key-GDPR-requirements-and-how-to-meet-them?src=5737362&asrc=EM_ERU_94056887&utm_content=eru-rd2-rcpE&utm_medium=EM&utm_source=ERU&utm_campaign=20180426_ERU%20Transmission%20for%2004/26/2018%20(UserUniverse:%202572767)
  • #21: Call to Action!