SlideShare une entreprise Scribd logo
1  sur  55
Navigating Privacy Laws ,[object Object],May 19, 2009
Your Speaker ,[object Object],[object Object],[object Object],[object Object]
Disclaimer ,[object Object]
Contents ,[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction
What’s the Problem?
What’s the Problem? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy Law Overview
Sources of Relevant Privacy Law ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Privacy Laws ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Should Providers and Developers Do?
Basic Reference Model
Developers and Providers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Developers and Providers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Communicate it to Customers Obtain and record their consent or deny access Changes in customer preferences or co.’s privacy practices Communicate preferences internally and downstream Employee training and management to ensure compliance Enforce internal controls Respond to mitigate violations Monitor / audit abuses Draft Policy Notice & Consent Implement & Enforce Developers and Providers Privacy Policy Process Diagram Respond to mitigate violations Inform affected Consumers as required by law
Providers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Developers and Providers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Developers and Providers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object]
Appendices
[object Object],[object Object],[object Object],Contact Information
Reference Material ,[object Object],[object Object],[object Object],[object Object]
Reference Material ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reference Material ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reference Material ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reference Material ,[object Object],Alaska  (ALASKA STAT. § 45.48.010 et seq.) Arizona  (ARIZ. REV. STAT. ANN. § 44-7501(h)) Arkansas  (ARK. CODE  ANN. § 4-110-101 et seq.) California  (CAL. CIV. CODE § 1798.82) Colorado  (COLO. REV. STAT. § 6-1-716) Connecticut  (CONN. GEN. STAT. § 36a-701b) Delaware  (DEL. CODE ANN. tit. 6, § 12B-101) District of Columbia  (District of Columbia B16-810, D.C. Code § 28-3851)  Florida  (FLA. STAT. § 817.5681) Georgia  (GA. CODE ANN. § 10-1-911) Hawaii  (Hawaii Revised Stat. §§ 487N-1 et seq.) Idaho  (IDAHO CODE ANN. § 28-51-104 et seq.) Illinois  (815 ILL. COMP. STAT. ANN. 530/5, /10) Indiana  (IND. CODE § 24-4.9) Iowa  (SF 2308) Kansas  (KAN. STAT. ANN. §§ 50-7a01-02) Louisiana  (LA. REV. STAT. ANN. § 51:3071 et seq.) Maine  (ME. REV. STAT. ANN. tit. 10, §1346 et seq.) Maryland  (MD Stat. Ann. § 14-3504) Massachusetts  (Massachusetts General Laws Ann. 93H §§ 1 et seq.) Michigan  (Michigan Compiled Laws Ann. 445.72) Minnesota  (MINN. STAT. § 325E.61) Montana  (MONT. CODE ANN. § 30-14-1704) Nebraska  (NEB. REV. STAT. § 87-801 et seq.) Nevada  (NEV. REV. STAT. 603A.010 et seq.) New Hampshire  (N.H. REV. STAT. ANN. § 359-C:19 et seq.) New Jersey  (N.J. STAT. ANN. § 56:8-163) New York  (N.Y. GEN. BUS. LAW § 899-aa) North Carolina  (N.C. GEN. STAT.§ 75-60 et seq.) North Dakota  (N.D. CENT. CODE § 51-30-01 et seq.) Ohio  (OHIO REV. CODE ANN. § 1349.19) Oklahoma  (Okla. Stat. § 74-3113.1) Oregon  (S.B. 583) Pennsylvania  (73 PA. CONS. STAT. ANN. § 2303) Puerto Rico  (Law 111 and Regulation 7207) Rhode Island  (R.I. GEN. LAWS § 11-49.2-3) South Carolina  (S.C. Code  § 37-20) Tennessee  (TENN. CODE ANN. § 47-18-21) Texas  (TEX. BUS. & COMM. CODE ANN. § 48.001 et seq.) Utah  (UTAH CODE ANN. § 13-44-101 et seq.) Vermont  (VT. STAT. ANN. tit. 9, § 2430 et seq.) Virginia  ( Va. Code § 18.2-186.6) Washington  (WASH. REV. CODE § 19.255.010) West Virginia  S.B. 340 Wisconsin  (WIS. STAT. § 134.98) Wyoming  (W.S. 40-12-501 through 40-12-509)

Contenu connexe

Tendances

Business And The Law
Business And The LawBusiness And The Law
Business And The Law
RobbieA
 
05S-30-cell phone summary
05S-30-cell phone summary05S-30-cell phone summary
05S-30-cell phone summary
Bridget Butler
 

Tendances (20)

Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
HIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach OverviewHIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach Overview
 
Practical Guide to GDPR 2017
Practical Guide to GDPR 2017Practical Guide to GDPR 2017
Practical Guide to GDPR 2017
 
05S-30-cell phone summary
05S-30-cell phone summary05S-30-cell phone summary
05S-30-cell phone summary
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Legislation
LegislationLegislation
Legislation
 
How will your business be affected and what you can do to stay ahead of the n...
How will your business be affected and what you can do to stay ahead of the n...How will your business be affected and what you can do to stay ahead of the n...
How will your business be affected and what you can do to stay ahead of the n...
 
Preparing for Compliance: Canada's Anti-Spam Law (CASL)
Preparing for Compliance: Canada's Anti-Spam Law (CASL)Preparing for Compliance: Canada's Anti-Spam Law (CASL)
Preparing for Compliance: Canada's Anti-Spam Law (CASL)
 
GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands
 
GDPR - Are you ready?
GDPR - Are you ready?GDPR - Are you ready?
GDPR - Are you ready?
 
electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)
 
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jonesTech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
Tech Connect Live 30th May 2018 ,GDPR Summit Hugh jones
 
Key Issues on the new General Data Protection Regulation
Key Issues on the new General Data Protection RegulationKey Issues on the new General Data Protection Regulation
Key Issues on the new General Data Protection Regulation
 
CASL - Canadian Anti-Span Legislation
CASL - Canadian Anti-Span LegislationCASL - Canadian Anti-Span Legislation
CASL - Canadian Anti-Span Legislation
 
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Research and The Law
Research and The LawResearch and The Law
Research and The Law
 
TCPA and Contact Center Law: What's on the Horizon in 2017?
TCPA and Contact Center Law: What's on the Horizon in 2017? TCPA and Contact Center Law: What's on the Horizon in 2017?
TCPA and Contact Center Law: What's on the Horizon in 2017?
 
Aet wk 6
Aet wk 6 Aet wk 6
Aet wk 6
 
28014_EY Safe Harbor_UK
28014_EY Safe Harbor_UK28014_EY Safe Harbor_UK
28014_EY Safe Harbor_UK
 

Similaire à Navigating Privacy Laws When Developing And Deploying Location Tracking Applications Presentation 1

Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
satyakam_biswas
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
Yizi
 
EC2017 United Kingdom
EC2017  United KingdomEC2017  United Kingdom
EC2017 United Kingdom
Robert Bond
 
Tangible Data Protection White Paper
Tangible Data Protection White PaperTangible Data Protection White Paper
Tangible Data Protection White Paper
Nick Banbury
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Dr. Donald Macfarlane
 
I’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docxI’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docx
donnajames55
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
gorsline
 

Similaire à Navigating Privacy Laws When Developing And Deploying Location Tracking Applications Presentation 1 (20)

Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Protecting your business
Protecting your businessProtecting your business
Protecting your business
 
EC2017 United Kingdom
EC2017  United KingdomEC2017  United Kingdom
EC2017 United Kingdom
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
 
General data protection regulation
General data protection regulationGeneral data protection regulation
General data protection regulation
 
Tangible Data Protection White Paper
Tangible Data Protection White PaperTangible Data Protection White Paper
Tangible Data Protection White Paper
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in Mexico
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
 
Ten Laws Internet Businesses Should Consider Part I
Ten Laws Internet Businesses Should Consider Part ITen Laws Internet Businesses Should Consider Part I
Ten Laws Internet Businesses Should Consider Part I
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues
 
Group 5 Banking Laws Semi Finals.pptx
Group 5 Banking Laws Semi Finals.pptxGroup 5 Banking Laws Semi Finals.pptx
Group 5 Banking Laws Semi Finals.pptx
 
I’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docxI’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docx
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
 

Plus de Ben Allen (20)

Layar
LayarLayar
Layar
 
Sense networks
Sense networksSense networks
Sense networks
 
Reserve x
Reserve xReserve x
Reserve x
 
Ogilvy
OgilvyOgilvy
Ogilvy
 
Michael metcalf
Michael metcalfMichael metcalf
Michael metcalf
 
Marketmap
MarketmapMarketmap
Marketmap
 
Forrester
ForresterForrester
Forrester
 
Tyler bell
Tyler bellTyler bell
Tyler bell
 
Harris Interactive, Placecast LBS Marketing Poll
Harris Interactive, Placecast LBS Marketing PollHarris Interactive, Placecast LBS Marketing Poll
Harris Interactive, Placecast LBS Marketing Poll
 
Xtify overview
Xtify overviewXtify overview
Xtify overview
 
Google Mobile Local
Google Mobile LocalGoogle Mobile Local
Google Mobile Local
 
Microsoft Localizing the Portal
Microsoft Localizing the PortalMicrosoft Localizing the Portal
Microsoft Localizing the Portal
 
Parking Data Ventures
Parking Data VenturesParking Data Ventures
Parking Data Ventures
 
DirectoryM
DirectoryMDirectoryM
DirectoryM
 
Kelsey: Top 5 Mobile Trends
Kelsey: Top 5 Mobile TrendsKelsey: Top 5 Mobile Trends
Kelsey: Top 5 Mobile Trends
 
Michael Boland Local Social
Michael Boland Local SocialMichael Boland Local Social
Michael Boland Local Social
 
iPromote - Self Service Display
iPromote - Self Service DisplayiPromote - Self Service Display
iPromote - Self Service Display
 
Marchex Reputation Mgt
Marchex Reputation MgtMarchex Reputation Mgt
Marchex Reputation Mgt
 
Kelsey: Digital Out of Home
Kelsey: Digital Out of HomeKelsey: Digital Out of Home
Kelsey: Digital Out of Home
 
Local.com - Local SEO
Local.com - Local SEOLocal.com - Local SEO
Local.com - Local SEO
 

Dernier

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Navigating Privacy Laws When Developing And Deploying Location Tracking Applications Presentation 1

  • 1.
  • 2.
  • 3.
  • 4.
  • 7.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. What Should Providers and Developers Do?
  • 42.
  • 43.
  • 44. Communicate it to Customers Obtain and record their consent or deny access Changes in customer preferences or co.’s privacy practices Communicate preferences internally and downstream Employee training and management to ensure compliance Enforce internal controls Respond to mitigate violations Monitor / audit abuses Draft Policy Notice & Consent Implement & Enforce Developers and Providers Privacy Policy Process Diagram Respond to mitigate violations Inform affected Consumers as required by law
  • 45.
  • 46.
  • 47.
  • 48.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.