Practical Privacy Impact Assessments – Tips and Traps for Privacy

Presented by

Toby Stevens, Director, Enterprise Privacy Group

About this talk

Privacy and Data Protection have risen to the top of the Information Governance agenda, yet the processes to ensure compliance and proactive risk management are poorly understood by many organisations. This problem is compounded by the explosion in Web 2.0 and cloud computing: it is becoming increasingly difficult to understand what data is under the control of an organisation, let alone where it is or how it is being used. Organisations that fail to address privacy-related issues risk regulatory punishment and media censure, and a privacy compliance strategy is now as important as any traditional security strategy. In this session Toby Stevens, Director of privacy think-tank the Enterprise Privacy Group, will share his experiences on how, why and when to conduct a Privacy Impact Assessment; what the complications are for cloud computing and Web 2.0; and what traps await organisations when they first tackle privacy problems. TOBY STEVENS BEng(Hons) FBCS CITP MIoD is an acknowledged identity, privacy and security expert with strong leadership and project management skills. Currently the Founder and Director of the Enterprise Privacy Group, a think-tank for identity-related issues, he has worked in a range of management roles across the financial services and internet sectors. He specialises in facilitating debate about the implications of managing privacy and personal information, but has also worked in security management research, Year 2000, euro implementation and broader IT project management roles. Toby sits on the Department for Transport’s Road Pricing Advisory Forum, and publishes a privacy blog for Computer Weekly. He is a Fellow of the British Computer Society, where he chairs the Information Privacy Expert Panel, and is a CLAS consultant.

Related topics:

More from this channel

Upcoming talks (21)
On-demand talks (3501)
Subscribers (180313)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.