IAPPEuDPC 2014 Nov. 18, 2014 to Nov. 20, 2014, brussels,belgium

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
A Transatlantic Perspective: BCRs, Safe Harbor and Privacy Seals Ted Dean , Florence Raynal , Joseph Srouji , Henriette Tielemans This conversation in privacy follows on from discussions that took place during the recent IAPP ...
Big but Not Bad Data: U.S. and EU Perspectives Maureen Ohlhausen , Lydia Parnes , Beatrice Covassi Innovation is driven by data and, in the world of data, the latest buzzword is ...
Conversations in Privacy: Brendon Lynch, CPO of Microsoft Brendon Lynch , Sam Pfeifle Microsoft is right in the thick of the biggest privacy topics of the day, whether ...
One in a Billion—Max Schrems v. Facebook Ralf Bendrath , Omer Tene , Eduardo Ustaran , Max Schrems With more than a billion people using its free service worldwide, Facebook is not used ...
Adviser? Auditor? Enforcer? Facilitator? The Evolving Role of the DPO Yvonne Cunnane , Stephan Geering , Tobias Brautigam , Philippe Renaudière , Bridget C. Treacy The DPO has many roles to play—from adviser to auditor, from facilitator to enforcer. No ...
Disclosure Requests: Are You Ready to Face the Regulators? Paul T. Friedman , Hanno Timner As anti-corruption laws in the U.S. and EU are increasingly being more aggressively enforced, multinational ...
Making Accountability Work for You Rosemary Jay , Ellis I. Parry , Louise Thorpe , Mike Yeh “Accountability” is broadly accepted as a key feature of European data protection compliance programmes. Elements ...
Privacy Engineering: Closing the Gap between Privacy by Design and Implementation Tomi Mikkonen , Antti Vähä-sipilä The Privacy by Design (PbD) principles are useful for setting the high-level targets of privacy-aware ...
Privacy Risk Framework and Risk-based Approach: Delivering Effective Data Protection in Practice Bojana Bellamy , Mikko Niva , Joann C. Stonier Organisations are both required and expected to implement privacy risk frameworks as a matter of ...
EU Data Protection Reform and Data Localisation Initiatives: Impacts and Strategies for Global Data Transfers Cédric Burton , Caroline Louveaux , Maria Ostashenko , Isabelle Vereecken In this interactive discussion, we will address the impact of the EU data protection regulation ...
EU and U.S. Data Sharing—Can Tensions Be Resolved? Harriet Pearson , Vivienne Artz , Simon Mcdougall Due to the breadth of the topic, we will focus on the EU—including the latest ...
Working with an Obsolete Directive: Direct Marketing and International Data Transfer Denis Kelleher Join this in-depth look at how Directive 95/46/EC has become onerous in its obsolescence, with ...
Big Data Protection: Optimising Data Value while Protecting Individuals David J. Evans , Lokke Moerel , Stefan Weiss "Big data" is seen as the most influential technology trend that will ‘transform how we ...
How Big Is Your Data? Understanding Opportunities and Risks Jens-henrik Jeppesen , Emily Mcreynolds , Karin G. Retzer Big data has become an invaluable tool for businesses to collect, analyse and mine to ...
Online Advertising Mashup Ulrich Baumgartner This interactive session will explore the biggest issues in online advertising today from both a ...
Predictive Analytics and Big Data: An Open Discussion with the ICO and Business David C. Smith , Stefano Fratta , Boris Wojtan Businesses want to harness the power of analytics and big data to predict outcomes (and ...
A Privacy-focused Approach to Mobile: Collecting, Using and Sharing Data via Mobile Devices Chris Davies , Alexander John Hanff This interactive session will provide detailed insights into what actually happens to user data via ...
Connected Cars and Privacy: A False or Real Dichotomy? Francesca Gaudino , Peter Katko Car manufacturers as well as telecoms operators and technology providers are facing more and more ...
Internet Privacy Engineering: Technical Solutions to Real-life Problems Mikko Niva , Achim Klabunde , Simon Rice Privacy regulators and legislators invest considerably in defining and interpreting legal rules for the protection ...
Civil Drone Use: Keeping It Civil with Privacy by Design David Black , Rainer Knyrim Video drones have become smaller and more affordable for businesses and the general public and ...
Location, Location, Location Jules Polonetsky , Ruth Boardman , Vanessa Mortiaux , Thomas Sheppard From measuring footfall in public spaces to sending tailored offers for local retailers, more and ...
Preserving Privacy for Genetic Data in the Cloud W. Knox Carey Given the substantial privacy risks, human genetic data is one of the most sensitive data ...
The Benefits of Using Pseudonymised Data Uwe W. Fiedler Come hear a concise overview of existing global laws referencing pseudonymised data, ISO standards and ...
Are You Ready to Handle a Data Breach? Breach Response under the Forthcoming General Data Protection Regulation Nick Graham , Alessandro Lezzi , Andrew Rogoyski , Andrew Thomas This session will give you the opportunity to actually try your hand at data breach ...
Cybersecurity—The Problem and the Solutions Cameron F. Kerry , Darren Argyle , Ann R. , Andrew Martinez Suffering a cybersecurity event is often described as not a question of ‘if’ but ‘when’. ...
Don’t Mess with Kids’ Data—Understanding the Sensitivities, Legal Framework and Best Practice Solutions for Protecting Children’s Privacy Online Joanne Furtsch , Sue Gold , Katie Ratte , Max Sorensen The post-millennial generation of consumers (Generation Z) is growing up to be the most technologically ...
EU BCRs and APEC CBPRs: Cornerstones for Future Interoperability? Florence Raynal , Markus Heyder , Christina Peters , Daniel Pradelles , Hilary Wandall In an era of global data flows it is imperative that different privacy regimes work ...
Efficient Strategies for Setting Up a Global Shared Services Infrastructure for Multinationals Michael Schmidl This interactive session will address the EU privacy law requirements pursuant to the local requirements ...
From Russia with Love Michael Lamb , Anna Shashina , Yael Weinman If you thought EU data transfer restrictions were tough, wait until you have to deal ...
Government Use of Cloud Computing Hans Graux , Liesbeth Hellemans , Peter Strickx , Dirk Van-rooy Cloud computing is not the privilege anymore of the private sector. Nowadays, public authorities too ...
How to Effectively Implement Privacy and Data Protection into Business Practices? Julie Brill , Joann C. Stonier , Michael H. Rubin , Stephen Bolinger , Sophie Nerbonne , João Torres Barreiro Here, we will explore how to effectively implement and integrate privacy and data protection into ...
Multidimensional Data Flow Maps: A Fundamental Building Block of Your Privacy Impact Assessments Ryan Reynolds , Erik Luysterborg , Iris Theunis A privacy or security programme is only as strong as its weakest link, and there ...
Online Payments: Bridging the Gap Between Fraud Prevention and Data Protection Compliance Ariane Mole Reducing the risk of credit card fraud is a necessity for any organization—no matter how ...
Privacy Platform: Online Searching and Privacy in the EU: The Right to Be Forgotten and the Costeja Judgment Sophie In’t Veld , Filippo Colombo , Peter Fleischer , Joe Mcnamee , Joaquín Muñoz Rodríguez This edition of the Privacy Platform addresses the right for data subjects to request data ...
Quantified Self and Potential Regulatory Reform Achim Klabunde , Marcy Wilder , Gwendal Le Grand , Winston Maxwell , James Leaton-gray This panel will focus on a multijurisdictional study commissioned by the CNIL in 2014 to ...