With advancing digitalisation, classic automation and privacy protection are increasingly clashing.

Many large ICT projects in government and business fail or deliver less than expected. Large-scale computerisation or chain cooperation therefore requires a different approach, namely one that takes into account the uncontrollability and unpredictability of large-scale information exchanges.

The legal tools for appropriate privacy protection seem inappropriate for large-scale information exchanges.

There is a lack of an overarching strategy and common purpose among the many partners.

This was explained with examples from the healthcare sector and legal criminal practice with identity fraud as a key point. (Are you really who you say you are?).

What is missing is a "Dominant Chain Problem" that should guide large-scale computerisation.

The core tasks of a hospital in particular are care and research. Patient data (privacy-sensitive data) are of great importance for carrying out care and research, and patient data are collected, stored and processed for this purpose. Because of these activities, it is therefore important to pay sufficient attention to addressing this data privacy so that data breaches and the sanctions and reputational damage resulting from them are prevented as much as possible.

In 2016, for instance, two important Data Privacy legislative changes are in the pipeline for healthcare institutions:

1. Mandatory data breach notification
2. Adaptation of European privacy legislation

Read the Whitepaper in this context , "Data Leak Prevention (DLP) in Healthcare" ,

more about how healthcare institutions can deal with data privacy and

preventing data leaks, keeping in mind the upcoming data privacy law changes.

Also on 28 January was Data Privacy Day, an international day dedicated to privacy, data protection and trust.

Awareness is the magic word.

This can be read in HCC's News Release of 28 Jan.

In the meantime, you can get started by optimally protecting your own privacy, many tips can be found on HCC, ComputerTotaal, Tips and Tricks, etc.

Description

The Telecommunications Department invites you to the lecture evening with the theme: 'Privacy by design' in large-scale computerisation.
This evening will present the main insights arising from various studies on large-scale computerisation and data protection, using the doctrine of chain computerisation.

The theme of the evening is 'privacy by design' in large-scale computerisation. With advancing digitisation, classic automation and privacy protection are increasingly clashing. Many large ICT projects in government and business fail or deliver less than expected. Large-scale computerisation or chain cooperation therefore requires a different approach, namely one that takes into account the uncontrollability and unpredictability of large-scale information exchanges. The legal tools for appropriate privacy protection seem inappropriate for large-scale information exchanges. The starting point for the evening is that data communication and computerisation must face a common challenge in this context, as in large-scale applications 'privacy by design' and technical designs become increasingly interdependent.
The chain computerisation approach is explained. This is followed by an explanation of the inadequacy of privacy tools. Next, the results of chain research at Utrecht University are discussed. This is followed by an outline of how our privacy protection can be improved.
The speakers will then be happy to discuss with you the challenges privacy by design in large-scale computerisation has in store for all parties involved. Is the role of data communication specialists in societal computerisation changing? Is it an important agenda item for the coming decades?

Speaker(s)

- Prof Dr J. (Jan) H.A.M. Grijpink (Emeritus Extraordinary Professor at the Faculty of Science of Utrecht University with the teaching assignment Chain-computerisation in the rule of law)
- Ms M.J. (Marie-José) Bonthuis (IT lawyer specialising in data protection, PhD Data protection in chain cooperation).

Location

KIVI building

Prinsessegracht 23, 2514 AP The Hague

Organiser

Telecommunications

Name and contact details for information

ir. J. Gerrese at the e-mail address below

jos.gerrese@casema.nl

Notes on the speakers