Previous Page  12 / 32 Next Page
Information
Show Menu
Previous Page 12 / 32 Next Page
Page Background

PCPD News

私隱專員公署通訊

Issue no. 29

12

PCPD in Action

公署動態

Case in Brief

個案摘要

Data Protection in Property Management

物業管理的資料保障

COVER STORY

專題報道

Mark Your Diary

活動日誌

Resources Updates

資源快訊

Statistics

統計

Glossary

詞彙

Technology Updates

科技新知

私隱專員與代表團、國際會議的講者及本地私隱保障專家合照。

Privacy Commissioner connects members of the delegation and speakers at the International Conference with local

privacy experts.

The event connected overseas experts

in the data privacy field with local

privacy academics and stakeholders on

various privacy issues including Big Data

and analytics, the de-identification of

personal data, privacy risk management,

and the Internet.

Professor John Bacon-Shone, Director of

the Social Science Research Centre at the

University of Hong Kong and a member

of the PCPD’s Standing Committee on

Technological Developments

, acted as

moderator for the session.

De l ga t i n membe r

Ms

Chr i s t i na

Peters, Chief Privacy Officer of IBM

,

pointed out that the law was having

trouble keeping up with the rapid

development of technology because

new technological developments had

created an unprecedented flow of data.

She explained the challenge nowadays

was to help organisations understand

what their options were regarding the

protection of personal data privacy and

provide practical business solutions that

allowed them to remain compliant with

the law and respectful of the rights of

their clients. “Our businesses cannot

thrive unless people trust us,” she said.

Mr Mikko Niva, Privacy Director of

Finland’s Nokia

compared privacy

protection to a war that needs to be

fought on multiple fronts and suggested

companies establish a comprehensive

toolkit to comply with privacy principles.

“The first tool is the law and related

regulations. Then we focus on the

accountability of the organisation.

A me a n i n g f u l f r ame wo r k h e l p s

organisations become accountable.”

A new and important area to look at

is the standardisation of technological

safeguards, Mr Niva stressed. “If the

underlying technology doesn’t support

data privacy protection, then our efforts

will be wasted.”

He said he anticipated a more diversified

skill set among privacy professionals

in the future. “Privacy protection

professionals are no longer from just

the legal field to provide guidance and

answer questions. For example, we will

see the emergence of privacy engineers,

as we will need a huge amount of

security design to prevent risks.”

The delegation also reinforced the

importance of putting the fairness

principle into practice.

Ms

JoAnn Stonier,

Chief Privacy Officer at MasterCard

,

said she believed that everyone in an

organisation needed to have a certain

level of savvy about personal data privacy

and that an ethical code needed to be

enforced throughout the organisation

when dealing with the collection,

analysis and application of data. She

added that fairness was not limited to

providing a notice to customers.

Professor Bacon-Shone

echoed Ms

Stonier, citing the Octopus incident as an

example that showed the public in Hong

Kong how unfairly personal data was

being handled.

Mr Scott Taylor, Chief Privacy Officer

at Hewlett-Packard

, compared data

protection in Big Data analysis to

reducing air pollution, when he shared

his views on how to create a healthy

e n v i r onme n t f o r d a t a c o l l e c t i on

and protection. He said keeping the

environment as healthy as possible

required a mixture of regulations,

responsible responses from companies,

and participation by data subjects. “The

air is not always perfect, but we are doing

better than we did 30 years ago,” he said.

The participants also discussed whether

the current law was able to address

the needs created by technological

developments.

Professor Bacon-Shone

pointed out that

despite the weaknesses in the law in its

current form, the principle-based privacy

law was, in itself, sound. “We need to

distinguish whether there is weakness in

the principle, or there is a weakness in

the implementation of the principle in a

specific legal framework.“