Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


ISM - Cybercrime & Data Protection

No description

Els De Busser

on 14 September 2017

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of ISM - Cybercrime & Data Protection

Template by Missing Link
Images from Shutterstock.com

Data Protection Standards
Case examples

Correct & up to date
Not excessive
Purpose Limitation
Data Retention
To conclude

be aware of new legislation

data protection principles
remain the same

new issues arise already
Cybercrime Law
Right to Privacy
art. 8 European Convention on Human Rights
art. 7 EU Charter of Fundamental Rights
Academic: right to be let alone
Right to Data Protection
art. 8 Charter of Fundamental Rights
since 2009
only in EU

personal data
Law Enforcement
data processor &
data controller
personal data breach
Quality of Data:
Quality of Data Processing:
in law
EU law
commercial matters
criminal matters
still applicable: Directive 95/46
May 2018: Regulation 2016/679 (GDPR)
still applicable: Framework Decision 2008
May 2018: Directive 2016/680 (Law enforcement directive)
risk-based approach:
encouraging anonymisation, pseudonymisation & encryption
impact assessments
data breach notification within 72hrs to supervisory authority and to data subject asap
so new issues to be solved!
medical secrecy
impact on school/personal environment
emotional impact on parents & children
misuse of data by blackmailers, charlatans, sects, etc.
interruption of treatment
accidental poisoning by drug allergy or inconsistent drugs
undue delay in reimbursement of financial assistance
impact on ability to find a job, mortgage, etc.
impact on work/personal environment
emotional impact
identity fraud
unlawful data processing
Risk Mitigation
Data Protection
Impact Assessments
Supervisory Authority
Notification of data breach
also risk-based approach
Full transcript