ࡱ> zy(@ F/ 0|DArialBlacr ( 0( 0 "DGaramondcr ( 0( 0  DTimes New Roman( 0( 0 0DWingdingsRoman( 0( 0 @DArial Blackman( 0( 0 " A .  @n?" dd@  @@`` 8&L  5()   !$#2% 0AA@8<ʚ;ʚ;g4VdVd@ 02ppp@ <4ddddlqt 0r  A9___PPT10 6GPrivacy Challenges(Legal/Regulatory Challenges HIPAA GLBA Canadian Privacy Law Fair Information Practices Consumer Trust Identity Theft California SB1386 Law Brand Management/Enhancement Customer Satisfaction Market Differentiation Cost Management;-;  -Privacy Impact AssessmentProcess Management Training Audits Customer support Management escalations Acquisition & mergers Data Management Data inventory Data pull, report, script review & correction Data model & classification Data transfers Consent & preference mgmt. `ZNZZZN |IT Management Policy implementation Access control, use conditions Audit logs Change management Privacy assessments, reviews&oo Privacy Impact AssessmentMarketing & Brand Management Cost of change to reputation New product development Communication Consent, preference management Employee consent costs Privacy Policy Trust `Z5ZZMZ5L Legal Policy Creation & Management Defense costs Loss of judgment Contracts with customers, partners, suppliers Compliance systems and costs??? dj j Privacy Management SolutionNeeds Assessment Resident/Community Administrative/Operational Policies Privacy Security System/Net Access & Use HR/Personnel Incident Response Marketing & Communication n/ c/ c Best Practices & Procedures Business Process & Rules Data Flow Analysis Business Function & Role Definition Application Control 6dd Privacy Management SolutionSecurity Issues & Concerns Authentication Identity Management Access Control Data Synchronization Training Management Employee Customer Service bG %G % 9Resident Outreach Compliance Functions /reporting Audits 822Layers of Privacy Protection(JCustomer Facing Cookie mgrs./blockers Ad blockers/Spam tools Anonymizers P3P (XML solutions) Privacy brokers/networks Purpose/Preference Specification Defense In Depth Enterprise Purpose Management Preference Management Monitoring Data Transfer Auditing: Monitoring & Accountability Encryption software Compliance/Reporting toolsUZ UZFF F !Deployment Considerations/Factors""(Needs/Risk analysis Risk mitigation/mediation Optimization of processes for the online environment Installed base/infrastructure (supplement w/network diagrams) Building the Business Case - Costs & Benefits Short, mid, long-term approaches Building out according to a long-term strategy Testbed vs. full deployment Outsourcing data management operations Ongoing maintenance and re-assessment :/k/k  Benefits from Privacy Management!!(ROI Process automation Employee productivity Administrative FTE savings Lowered procurement costs Lower TCO Higher customer satisfaction Greater customer retention 8 Business Drivers Product/service differentiation Better knowledge, control and understanding of information flows Better ability to limit information collection and storage to necessary elements In some cases less information is more useful& Better knowledge of customer preferences yields greater chance that mails are actually readN/\/\ ` 3` ff>>\fg` J*T333` QYmx~3ft` \ғhEy`` cb^DDf`Y˵W` sg7xGr` K%ޯd{mG/` 33f` f>?" dd@,?nFd@    @ `  n?" dd@   @@``PR    @ ` `<p>>  HP(  H H 68r  #" `b ` r  >*  H 6\r  #" `` ` r  @* xT ~ H "~\ { H "{ H c BB CDEFd @ bb   H   T W6Vw}\gFQ6<1++11 1L b6xQrq 6\}N   - c    0 A Q g     S    6N KawF bFy0 a*ly7lE;uz  B | a F 0 ! 1 < B < & l L 0  @`"T  H c |BC+DEFyd @ ==gL6cI}\eA& w6m!W<! &<W!r6W}F6\}>68QNlX^XH8+Sgg|@`"Jo 5 J H  B! CDEF @ ))\*l{FDNF W% W ! !   ! 6X L b x_ /aF6b}SA$|l\\TX@`s"*  T  u4  H B C%DEF ss&QW}k6D Q r 8 N c t y y ;t Qi gS }8     T   :0\-Q4*%%v*o(V}5q;  S   < s } l \ g} \, L ;n &  Z}\[6 }WF<! e C }h m W ]  ,t B RxkqA,Rg@`" {b  H  BCDEFy @ ,,Lh6\}mWG &a*zCxsh-&jG]~5g6&LLZ\@`s"*   u(   H  BCDE|Fy @ __@% M|f4@{ f0`lA}L\A+h MB6ww FJl{ 0V|{J  *5KlGn a*:Pf\|6 /6Kbf|F kP}5x}VvaP@@@`s"*   =>   H c BlCrDEF"d@ rlrl@`"~  H 6,_r  " `} r  T Click to edit Master title style! ! H 6r  #" ``  r  @* $ H 0@r  " ` r  RClick to edit Master text styles Second level Third level Fourth level Fifth level!     SB H s *޽h ? f___PPT10i. u%.+D=' = @B +  Streamb  yq0L(  LxT ~ L "~\ { L "{ L c BB CDEFd @ bb   H   T W6Vw}\gFQ6<1++11 1L b6xQrq 6\}N   - c    0 A Q g     S    6N KawF bFy0 a*ly7lE;uz  B | a F 0 ! 1 < B < & l L 0  @`"T  L c |BC+DEFyd @ ==gL6cI}\eA& w6m!W<! &<W!r6W}F6\}>68QNlX^XH8+Sgg|@`"Jo 5 J L  B! CDEF @ ))\*l{FDNF W% W ! !   ! 6X L b x_ /aF6b}SA$|l\\TX@`s"*  T  u4 L B C%DEF ss&QW}k6D Q r 8 N c t y y ;t Qi gS }8     T   :0\-Q4*%%v*o(V}5q;  S   < s } l \ g} \, L ;n &  Z}\[6 }WF<! e C }h m W ]  ,t B RxkqA,Rg@`" {b L  BCDEFy @ ,,Lh6\}mWG &a*zCxsh-&jG]~5g6&LLZ\@`s"*   u(   L  BCDE|Fy @ __@% M|f4@{ f0`lA}L\A+h MB6ww FJl{ 0V|{J  *5KlGn a*:Pf\|6 /6Kbf|F kP}5x}VvaP@@@`s"*   =>   L c BlCrDEF"d@ rlrl@`"~  L <9 "F  : T Click to edit Master title style! !  L 0H9 " `   9 W#Click to edit Master subtitle style$ $  L 6T9 #" `` ` 9 >*  L 6!9 #" `b  9 @*  L 6|9 #" `d ` 9 @* B L s *޽h ? f___PPT10i. u%.+D=' = @B + @((    N8kk z%  r  \* K%%KKpp  N8kk  ?% r  ^* K%%KKpp  T8kk z  e \* K%%KKpp  T48kk  ? 8 ^* K%%KKppH  0.k ? 3380___PPT10.&"<  @P<(  P~ P s *e H `p  e ~ P s *|eH `P e H P 0޽h ? x-т80___PPT10.%@   PTl(  T~ T s *d: H `  :  T s *:H   : $%%@` T s 90e0e H3"0e`u ` r  $%%@`H T 0޽h ? x-т___PPT10i.g+D=' = @B +  Pl(  ~  s *t9 H `  9   s *9H   9 $%%@`  s 590e0e H3"0e`u ` r  $%%@`H  0޽h ? x-т___PPT10i.g+D=' = @B +  `X`X(  X~ X s *:9 H `}  9  X s *0G9H   9 "% @ X s */r Hu ` r  $%%@`H X 0޽h ? x-т80___PPT10.%v  `X(  ~  s *9 H `}  9   s *9H   9 "% @  s *9Hu ` r  $%%@`H  0޽h ? x-т80___PPT10.%v     p \r (  \~ \ s *9 H `  9 ( \ 3 r9 3 f11?H"B   p  9 $%@`2 \ c $e 3v @f11?#"    6"0 #2 \ c h9 3fv @f11?#"   0 6"0 #2 \ s 9 3 2 @f11?"0   6"0 # 2 \ s X9 3v2 @f11?"p0  BData"0 " \ N9 ?"K  LAuthentication"0 "  \ N9 ?"N X LAccess Control"0 "  \ N9 ?"P J K Authorization"0 "  \ TP91?w =  0 #H \ 0޽h ? 'Qa0y___PPT10Y+D=' = @B +R  `R(  `~ ` s *T9 H `@  9  ` s *t_9Hp 9 "% @H ` 0޽h ? x-т80___PPT10.%ш  2*d(  d~ d s *g9 H `  9 ~ d s *hh9H   9 ~ d s *TPowerPoint Document(/zDocumentSummaryInformation8i