<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>edisclosure myth or reality? &#187; Data</title>
	<atom:link href="https://jollyvip.com/edisclosure/category/data/feed/" rel="self" type="application/rss+xml" />
	<link>https://jollyvip.com/edisclosure</link>
	<description>From litigation to the arbitration regime</description>
	<lastBuildDate>Tue, 01 Jul 2025 10:14:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.1</generator>
		<item>
		<title>Anonymisation &amp; GDPR</title>
		<link>https://jollyvip.com/edisclosure/2018/03/30/anonymisation-gdpr/</link>
		<comments>https://jollyvip.com/edisclosure/2018/03/30/anonymisation-gdpr/#comments</comments>
		<pubDate>Fri, 30 Mar 2018 13:09:58 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[2018]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Tools]]></category>

		<guid isPermaLink="false">http://jollyvip.com/edisclosure/?p=777</guid>
		<description><![CDATA[Yesterday evening, 29th March 2018 I attended a BCS Law Specialist Group event &#8211; GDPR: Anonymisation,re-identification risk and GDPR profiling. The talk was presented by Dr. Amandine Jambert from the French Data Authority CNIL. The anonymisation slide is interesting. I asked whether the WP29 thinking (&#038; their opinions) about the 3 properties are for the [...]]]></description>
			<content:encoded><![CDATA[<p>Yesterday evening, 29th March 2018 I attended a BCS Law Specialist Group event &#8211; GDPR: Anonymisation,re-identification risk and GDPR profiling. The talk was presented by Dr. Amandine Jambert from the French Data Authority CNIL. The anonymisation slide is interesting.<a href="http://jollyvip.com/research/files/2018/03/anonymisation.png"><img src="http://jollyvip.com/research/files/2018/03/anonymisation.png" alt="" title="anonymisation" width="500" height="355" class="aligncenter size-full wp-image-1170" /></a></p>
<p>I asked whether the WP29 thinking (&#038; their opinions) about the 3 properties are for the &#8216;direct and indirect&#8217; way of identification of the personal data. The answer was not in the method itself but that the properties are for &#8216;all data types&#8217; i.e. any dataset. Her exact wordings &#8216; use by anyone on any dataset&#8217;. Also, the DPA (DPO/Organisation?) needs to prove (or justify or show) that the dataset has indeed been anonymised (using any of the 2 options). My understanding is that the anonymisation if done (risk-based, database and/or algorithmic-driven) should not enable the direct and indirect re-identification of the individual(s).<br />
As noted on this slide:<a href="http://jollyvip.com/research/files/2018/03/evaluation-table.png"><img src="http://jollyvip.com/research/files/2018/03/evaluation-table.png" alt="" title="evaluation table" width="515" height="357" class="aligncenter size-full wp-image-1171" /></a> &#8216;No single technique eliminates all risks&#8217;. </p>
<p>It&#8217;s near impossible to identify/isolate &#8216;all the direct/indirect re-identification risks&#8217; associated with any dataset, assuming the dataset is available and not hidden in some Cloud and/or in a chain of hidden registers.</p>
<p>We really need to re-think personal data in terms of &#8216;the harm to individuals&#8217; as there&#8217;s no absolutely sure way of preventing re-identification risks (i.e. singling out, linkability or inference/deduction etc.)</p>
<p>Overall a great talk.</p>
<p>I just noticed the slides and talk are available <a href="https://bcs.cloud.panopto.eu/Panopto/Pages/Viewer.aspx?id=d8162ce3-9830-4fbb-8ecc-a89601736df8" title="BCS Law" target="_blank">online: BCS Law talk 29th March 2018</a></p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2018/03/30/anonymisation-gdpr/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>social data &#8211; Facebook</title>
		<link>https://jollyvip.com/edisclosure/2018/03/22/social-data-facebook/</link>
		<comments>https://jollyvip.com/edisclosure/2018/03/22/social-data-facebook/#comments</comments>
		<pubDate>Thu, 22 Mar 2018 00:35:26 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[2018]]></category>
		<category><![CDATA[Community]]></category>
		<category><![CDATA[Data]]></category>

		<guid isPermaLink="false">http://jollyvip.com/edisclosure/?p=768</guid>
		<description><![CDATA[A well-crafted post by Mark Zuckerberg:]]></description>
			<content:encoded><![CDATA[<p>A well-crafted post by Mark Zuckerberg:</p>
<p><iframe src="https://www.facebook.com/plugins/post.php?href=https%3A%2F%2Fwww.facebook.com%2Fcherseat%2Fposts%2F10156498912700955&#038;width=500" width="500" height="313" style="border:none;overflow:hidden" scrolling="no" frameborder="0" allowTransparency="true"></iframe></p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2018/03/22/social-data-facebook/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Privacy-by-design framework</title>
		<link>https://jollyvip.com/edisclosure/2018/03/07/privacy-by-design-framework/</link>
		<comments>https://jollyvip.com/edisclosure/2018/03/07/privacy-by-design-framework/#comments</comments>
		<pubDate>Wed, 07 Mar 2018 01:55:28 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[2018]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Tools]]></category>

		<guid isPermaLink="false">http://jollyvip.com/edisclosure/?p=761</guid>
		<description><![CDATA[#privacy-by-design framework for the collection and processing of behavioural #data -an #OASIS COEL TC deliverable http://bit.ly/2Hck3W9 The url: https://twitter.com/datachainrisk/status/971197667660492800]]></description>
			<content:encoded><![CDATA[<p>#privacy-by-design framework for the collection and<br />
processing of behavioural #data -an #OASIS COEL TC deliverable http://bit.ly/2Hck3W9 </p>
<p>The url:</p>
<p>https://twitter.com/datachainrisk/status/971197667660492800</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2018/03/07/privacy-by-design-framework/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Data Privacy Day 2016</title>
		<link>https://jollyvip.com/edisclosure/2016/01/27/data-privacy-day-2016/</link>
		<comments>https://jollyvip.com/edisclosure/2016/01/27/data-privacy-day-2016/#comments</comments>
		<pubDate>Wed, 27 Jan 2016 14:04:52 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[2016]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Data Protection and Privacy]]></category>
		<category><![CDATA[EU Data Protection]]></category>

		<guid isPermaLink="false">http://jollyvip.com/edisclosure/?p=604</guid>
		<description><![CDATA[Data Privacy Day event at City! Together with a City colleague, Dr David Haynes, we got our planned event into the City news page; http://www.city.ac.uk/news/2016/jan/data-privacy-day-discussion Headlines and content extracted and posted here; City experts to discuss data privacy The European Union (EU) General Data Protection Regulation (GDPR) and the recent European Court of Human Rights [...]]]></description>
			<content:encoded><![CDATA[<p>Data Privacy Day event at City!<br />
Together with a City colleague, Dr David Haynes, we got our planned event into the City news page;</p>
<p>http://www.city.ac.uk/news/2016/jan/data-privacy-day-discussion</p>
<p>Headlines and content extracted and posted here;</p>
<blockquote><p>City experts to discuss data privacy</p>
<p>The European Union (EU) General Data Protection Regulation (GDPR) and the recent European Court of Human Rights (ECHR) judgement are among several issues to be addressed by data privacy researchers.<br />
The latest European Union (EU) General Data Protection Regulation (GDPR) and the recent European Court of Human Rights (ECHR) judgement are among several issues which will be discussed by City University London researchers on Data Privacy Day, 28th January 2016. The event will take place in Room AG07a from Noon to 1pm.</p>
<p>The wording of the General Data Protection Regulation (GDPR) was agreed in December 2015. </p>
<p>The new Regulation began life as a draft document in 2012 and after being debated in the European Parliament and a trilogue between the three EU institutions (the European Council, the European Commission and the European Parliament) the final wording has been agreed. The GDPR will take effect from 2018 and strengthens the protection offered to individuals within the EU. </p>
<p>Among its new provisions are:</p>
<p>1. Better control of personal data by individuals.</p>
<p>2. Better access by individuals to their own data.</p>
<p>3. Data portability.</p>
<p>4. The right to be forgotten.</p>
<p>5. The right to know about serious data breaches.</p>
<p>Following active lobbying the new Regulation also aims to be more business-friendly by cutting out the red tape. SMEs that handle personal data (such as employee records) will no longer be required to register with the data protection authorities, so long as processing personal data is not their main business. Unlike the current Data Protection Directive, the new Regulation will automatically apply across all EU states – it does not have to be passed into national law, such as the UK’s Data Protection Act 1998. Businesses working across Europe will only have to deal with one authority, rather than the regulatory body in each state that it operates in.</p>
<p>A recent judgement by the European Court of Human Rights (ECHR) has highlighted some of these issues by ruling that employers are entitled to monitor employee communications when they are using the Internet during work hours. A Romanian worker sacked in 2007 for use of personal e-mail during work hours had appealed against a ruling by the Romanian courts that upheld his dismissal.</p>
<p>However the ECHR upheld a ruling by the Romanian Court, stating that it was not &#8216;unreasonable that an employer would want to verify that employees were completing their professional tasks during working hours&#8217;. This raises important issues for employees throughout the EU.</p>
<p>Definition	Data Privacy Day<br />
Data Privacy Day began in the United States and Canada in January 2008 as an extension of the Data Protection Day celebration in Europe. Data Protection Day commemorates the 28th January 1981, signing of Convention 108, the first legally binding international treaty dealing with privacy and data protection. Data Privacy Day is now a celebration for everyone, observed annually on 28th January.</p></blockquote>
<p>Hope to get this celebration to be an annual event at City University London.<br />
I&#8217;ll be doing a 5 mins talk on my current research.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2016/01/27/data-privacy-day-2016/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>attaching &#8216;identity&#8217; to data</title>
		<link>https://jollyvip.com/edisclosure/2012/04/02/attaching-identity-to-data/</link>
		<comments>https://jollyvip.com/edisclosure/2012/04/02/attaching-identity-to-data/#comments</comments>
		<pubDate>Mon, 02 Apr 2012 23:40:57 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2012]]></category>
		<category><![CDATA[Books]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Assurance]]></category>
		<category><![CDATA[BCS]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Identity]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=301</guid>
		<description><![CDATA[A publication &#8211; Aspects of Identity &#8211; from The British Computer Society Identity Assurance Working Group with foreword by Kim Cameron is available for download (pdf). From the publication: The BCS position is that individuals, not organisations, should remain in control of their personal identification, whether held by governments or other organisations. Individuals, organisations, governments [...]]]></description>
			<content:encoded><![CDATA[<p>A publication &#8211; Aspects of Identity &#8211; from The British Computer Society Identity Assurance Working Group with foreword by Kim Cameron is available for <a href="http://www.bcs.org/upload/pdf/aspects-of-identity.pdf">download (pdf)</a>. From the publication: <em>The BCS position is that individuals, not organisations, should remain in control of their personal identification, whether held by governments or other organisations.</em></p>
<p>Individuals, organisations, governments etc i.e. EVERYone who cares about their privacy should read the publication and decide what &#8216;identity&#8217; to attach to (their) data. (Identity Governance for all).</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2012/04/02/attaching-identity-to-data/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>cloud computing</title>
		<link>https://jollyvip.com/edisclosure/2012/02/22/cloud-computing/</link>
		<comments>https://jollyvip.com/edisclosure/2012/02/22/cloud-computing/#comments</comments>
		<pubDate>Wed, 22 Feb 2012 23:28:07 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2012]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[right to be forgotten]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=290</guid>
		<description><![CDATA[Cloud is here to stay (until another storm clears the current cloud), so might as well ride with the current cloud. Like picking up any new technology or looking to make sense of the new technology, I start with looking at the new technology with references to established methodologies, approaches or techniques or simply methods. [...]]]></description>
			<content:encoded><![CDATA[<p>Cloud is here to stay (until another storm clears the current cloud), so might as well ride with the current cloud.</p>
<p>Like picking up any new technology or looking to make sense of the new technology, I start with looking at the new technology with references to established methodologies, approaches or techniques or simply methods. These established methods are still around, come cloud or no cloud. </p>
<p>I have heard references of cloud computing in terms of outsourcing or another way of addressing or outsourcing your computing costs. So folks also talk about cloud computing in terms of opex and/or capex. Is cloud computing new technology or another way to talk about outsourcing your computing costs?</p>
<p>After reading this excellent write up on <a href="http://www.katescomment.com/what-is-cloud-computing/">Cloud Computing</a>,  my initial skepticism on cloud computing turns into childish delight! Ah! It makes sense to have the 4 letters i.e. SaaS, PaaS, IaaS to describe cloud computing in terms of services. It seems that cloud computing does resemble outsourcing except that with outsourcing one is led to address business function/activities instead of computing services. My next question -what services are offered by cloud computing that will radically change the way I work or use technology? An ediscovery question in cloud computing &#8211; will (or is) cloud computing radically change (changing) the ediscovery scene?</p>
<p>Right now I can&#8217;t think of any (cloud) services except that I will have to figure out what data do I consider cloud worthy. This sounds familiar in outsourcing too. The same question as what is core to my business, I keep in control and not outsource also applies to cloud computing. At the lowest level, is data core to my business? A tough question or a non question! There will be established or seasoned/reasoned questions which are irrelevant in cloud computing.</p>
<p>Businesses outsource their core function as &#8216;core&#8217; is not an accounting concept or an IT concept. We don&#8217;t talk about core accounting costs or core computing/technological data or services. Do we?</p>
<p>It seems the focus is no longer on &#8216;core business&#8217; or even services. Cloud computing is driving the way we handle or our ability to handle data &#8211; period. The signs are around us e.g.  &#8216;Big Data&#8217; and &#8216;BYOD&#8217;.</p>
<p>I am not interested in what cloud computing delivers, it is what data to &#8216;outsource&#8217;/give up to cloud service providers.  There is data protection act (soon a law in itself) and privacy related concerns. It will be interesting to see whether the changes to the data regime will define further questions or will the changes redefine the way cloud computing is currently defined. I have not come across a piece of legislation that changes the way technology is defined (&amp; hence it&#8217;s course of design, development and deployment). It is a known fact that law plays catch up in terms of technology. The <a href="http://www.stanfordlawreview.org/online/privacy-paradox/right-to-be-forgotten">&#8216;right to be forgotten</a>&#8216; is probably the policy/rule makers&#8217; way of acknowledging that computing is beyond &#8216;legal codifying&#8217;. Perhaps the policy makers in mixing data protection with privacy wanted to recapture the concept of privacy as defined by Judge Thomas Cooley in 1888 &#8211; The Law of Torts 29 (2d ed. 1888) &#8211; &#8216;the right to be left alone&#8217;.</p>
<p>So where does this lead to in terms of ediscovery, which is also here to stay whether cloud or no cloud.</p>
<p>One term that comes to mind is disruption as in disruptive technology with the intended consequences and (perceived) benefits.</p>
<p>Cloud computing is disruptive technology/computing for ediscovery at many levels as it touches on several areas where ediscovery is weak (in terms of uncertainty or complexity in data access and processing). Similar to the concept of &#8216;core&#8217;, &#8216;control&#8217; and  &#8216;trust&#8217; are meaningless in disruptive technology. Meaningless in the sense that one invariably (even with contractual agreements in place) loses control of data (in the cloud). The issue with trust is &#8211; how can we trust cloud providers if we loses control of data?  Control of data and issues of trust are interlock or meshed up as seen in the measures to deal with data protection and privacy rights. The emphasis on &#8216;protect&#8217; data (as in data protection rather than &#8216;control&#8217; ) seems to have lost its lustre in the attempt to address privacy of individual in the non physical data world. </p>
<p>So it is back to &#8216;handling of data&#8217; which is essentially what we do when we do ediscovery. We &#8216;handle&#8217; &#8211; as this cover all aspects of accessing or processing &#8211; as it is human that handle the data not computer.If this is not the case, why do we have ediscovery rules (CPR) that has description of &#8216;how to do&#8230;&#8217; .  Like all changes in rules/law, there will be disruption initially. So it is safe to say, changes in the data regime will disrupt the ediscovery rules or more accurately further disrupt the handling of data.</p>
<p>Can we define data in terms of services? It&#8217;s like defining personal and sensitive data (or secret data/info) as services for cloud computing. Maybe we are getting there in terms of 4 letters, as data is 4 letters too.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2012/02/22/cloud-computing/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>It&#8217;s starting with B something</title>
		<link>https://jollyvip.com/edisclosure/2012/02/22/its-starting-with-b-something/</link>
		<comments>https://jollyvip.com/edisclosure/2012/02/22/its-starting-with-b-something/#comments</comments>
		<pubDate>Wed, 22 Feb 2012 01:58:26 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2012]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[big data]]></category>
		<category><![CDATA[byod]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=282</guid>
		<description><![CDATA[Have you notice that &#8216;B something&#8217; is back in fashion? &#8216;Big Blue&#8217; in the 70s or is it in the 80s? Now we have &#8216;Big Data&#8217; and &#8216;BYOD&#8217;. In the ediscovery world, these two &#8216;B something&#8217; not only add extra vocabulary but also highlighted that data is &#8216;Big-ish to the petra super server level&#8217; and [...]]]></description>
			<content:encoded><![CDATA[<p>Have you notice that &#8216;B something&#8217; is back in fashion?<br />
&#8216;Big Blue&#8217; in the 70s or is it in the 80s?<br />
Now we have &#8216;Big Data&#8217; and &#8216;BYOD&#8217;.</p>
<p>In the ediscovery world, these two &#8216;B something&#8217; not only add extra vocabulary but also highlighted that data is &#8216;Big-ish to the petra super server level&#8217; and also &#8216;small-ish to the device level&#8217;.</p>
<p>Where do we start?</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2012/02/22/its-starting-with-b-something/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>&#8216;Tis the season</title>
		<link>https://jollyvip.com/edisclosure/2011/12/12/tis-the-season/</link>
		<comments>https://jollyvip.com/edisclosure/2011/12/12/tis-the-season/#comments</comments>
		<pubDate>Mon, 12 Dec 2011 23:47:24 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2011]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=265</guid>
		<description><![CDATA[&#8216;Tis the season &#8211; let the snow falls (on this website) and be joyous… For those of us who create applications (apps) or build systems we do so to meet business needs or to make a living or some other reasons. How we use the data subsequently (created by the apps) is generally not build [...]]]></description>
			<content:encoded><![CDATA[<p>&#8216;Tis the season &#8211; let the snow falls (on this website) and be joyous…</p>
<p>For those of us who create applications (apps) or build systems we do so to meet business needs or to make a living or some other reasons. How we use the data subsequently (created by the apps) is generally not build into the apps. We don’t design apps to limit data generation or to identify data with meta data such that we know every bit of data being created. It is like asking for an app that will track every bit of data being created without the app creating data too. Imagine an app for this and guess what will top the chart for next year end ediscovery survey!</p>
<p>Is it the same as uttering or saying less (e-mail or phone) to convey a message without the message being short circuited or miss-interpreted?</p>
<p>I use applications every day. I create data every day too. I make dumb decision some day. Today I make a decision which is dumb due to lack of data being conveyed.<br />
Dumb apps or dumb data or dumb me?</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2011/12/12/tis-the-season/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>why five principles?</title>
		<link>https://jollyvip.com/edisclosure/2011/08/31/why-five-principles/</link>
		<comments>https://jollyvip.com/edisclosure/2011/08/31/why-five-principles/#comments</comments>
		<pubDate>Wed, 31 Aug 2011 23:51:30 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2011]]></category>
		<category><![CDATA[collusion of]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[lexology]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Privacy by Design]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=256</guid>
		<description><![CDATA[I have not done a search for the original article or press statements on &#8216;the Commission’s concept for the future EU data privacy framework&#8217; as mentioned in Development and revision of global data privacy and security laws on lexology. Why five principles? This principle &#8211; Privacy by design -  sounds great with the 3 words [...]]]></description>
			<content:encoded><![CDATA[<p>I have not done a search for the original article or press statements on &#8216;the Commission’s concept for the future EU data privacy framework&#8217; as mentioned in <a title="Development and revision of global data privacy and security laws" href="http://www.lexology.com/library/detail.aspx?g=6c73a0f9-574b-482c-9a65-ab98ce9fff9b" target="_blank">Development and revision of global data privacy and security laws</a><br />
on lexology.</p>
<p>Why five principles?</p>
<p>This principle &#8211; <strong>Privacy by design</strong> -  sounds great with the 3 words title which is rather arty and catchy like a company&#8217;s business motto.</p>
<p>The description &#8211; &#8216;<em><strong>New</strong></em> <strong><em>technical</em></strong> developments have to observe data privacy requirements at  an <em><strong>early development stage</strong></em>, thus permitting the introduction of data  protecting hardware and software&#8217;.</p>
<p>Only &#8216;new&#8217; technical developments and at an &#8216;early&#8217; development stage?</p>
<p>Just another play with words for my own amusement.</p>
<p>In terms of designing hardware and software for data privacy and/or protection, the play with words will not help software folks.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2011/08/31/why-five-principles/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>to do with technology or not?</title>
		<link>https://jollyvip.com/edisclosure/2011/08/18/to-do-with-technology-or-not/</link>
		<comments>https://jollyvip.com/edisclosure/2011/08/18/to-do-with-technology-or-not/#comments</comments>
		<pubDate>Thu, 18 Aug 2011 13:57:45 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2011]]></category>
		<category><![CDATA[collusion of]]></category>
		<category><![CDATA[Community]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Barcelona]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[sociotech]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=251</guid>
		<description><![CDATA[Is everything I do, to do with technology? When I am asleep, I guess I have nothing to do with technology unless I am in a technological related dream. This will probably be the end of my spirited being. Here is an interesting question (or a dream question?) raised by someone at the Sociotechnology and [...]]]></description>
			<content:encoded><![CDATA[<p>Is everything I do, to do with technology?</p>
<p>When I am asleep, I guess I have nothing to do with technology unless I am in a technological related dream. This will probably be the end of my spirited being.</p>
<p>Here is an interesting question (or a dream question?) raised by someone at the Sociotechnology and Knowledge Development (sociotech) Group. I see nothing wrong in raising the question in my blog here. Any objections and concerns, please post here or contact cher at iedisc.com</p>
<p>Gosh! has technology got me to be so so cautious?!</p>
<p>The question coming from the sociotech group:</p>
<p><strong><em>What do we really mean by technology?</em></strong></p>
<p>This question sound similar to several questions raised by law/policy makers during an ediscovery conference I attended in 2009 in Barcelona.</p>
<p>Substitute the word <em><strong>‘technology’</strong></em> with <strong><em>‘processing’ or ‘privacy’ or ‘consent’</em></strong> (as in data protection), we end up with more dreamy questions with little common understanding or agreement, especially when discussing on ‘what are the real issues with cross border ediscovery?’.</p>
<p>The questions were based on this statement (or an opinion?):</p>
<p>There is no legal basis (or justification) for ‘processing’ which includes transferring, viewing, accessing etc, of data in ediscovery across the Atlantic (i.e. the Europe &amp; US divide). What? No viewing, i.e. I can’t even open-view the file/data !</p>
<p>I guess the answers were not in the questions being raised, as the only answer that the policy makers were seeking to get assurance is: ‘how safe is my (personal) data’?</p>
<p>So, <strong><em>‘What do we really mean by technology?</em></strong>’</p>
<p>My dreamy reply: ‘technology’ is a beast and also a non beast, a thing and also a thingy.</p>
<p>What is your view(s)?</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2011/08/18/to-do-with-technology-or-not/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
