InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Challenges and Opportunities in Implementing Privacy By Design in the Caribbean

Presented by

Christopher Reckord

About this talk

Challenges and Opportunities in Implementing Privacy By Design in the Caribbean - The Jamaica Data Protection Act 2020 as a Case Study. In the era of digital transformation, integrating Privacy by Design (PbD) is crucial for fostering trust and ensuring the protection of user data. It is a proactive approach to privacy protection that is embedded in all aspects of a business or organization's operations. The Jamaica Data Protection Act 2020 is a new law that was enacted to protect the privacy of Jamaicans. The Act requires businesses and organizations that collect and process personal data to comply with a number of privacy requirements, including some that map closely to privacy by design. This presentation will delve into the unique challenges and opportunities associated with implementing Privacy by Design within the Caribbean, using the Jamaica Data Protection Act 2020 as a case study. We will explore the foundational principles of PbD, such as proactive privacy measures and user-centric privacy, examining how these align with the mandates of the Jamaica Data Protection Act 2020. Additionally, we will spotlight the challenges faced by Caribbean nations and entities in embedding privacy into their operational and developmental frameworks.
Information Systems Security Association

Information Systems Security Association

40854 subscribers390 talks
Developing and Connecting Cybersecurity Leaders Globally
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.
Related topics