Personal Data Protection and Information Security INET Colombo 2011 Session II: Making the Internet Safe for Everyone Charles Mok Internet Society Hong Kong 2011.05.23
Privacy and Security Internet for all -> more problems? Growing awareness and media attention on personal data protection, privacy and information security Privacy legislation  Security vs convenience and openness However, there is a contrasting attitude on others vs attitude on oneself
Privacy Law in Hong Kong Personal Data Protection Ordinance, enacted in 1997. Enforced by the Privacy Commissioner for Personal Data Issue code of practice Investigate suspected breaches and issue enforcement notices  Awareness and education 2010 Review of the ordinance
Scope of the Ordinance The Ordinance covers any data relating directly or indirectly to a living individual (data subject), from which it is practicable to ascertain the identity of the individual and which are in a form in which access or processing is practicable. It applies to any person (data user) that controls the collection, holding, processing or use of personal data.
Six Data Protection Principles Principle 1: Purpose and manner of collection Principle 2: Accuracy and duration of retention Principle 3: Use of personal data Principle 4: Security of personal data Principle 5: Information to be generally available Principle 6: Access to personal data
Incidents – Leakages Public hospitals – staff losing USB thumb drives and other storage devices Police, immigration and fire departments* – leaking personal information and documents over P2P networks e.g. Foxy Banks – losing servers and tapes with customer transaction information Octopus (payment smartcard) – selling customer information to telemarketers and insurance companies
Other Recent PCO Actions Google collection of WiFi payload data Google Street View car operation Sony PlayStation Network
Emerging Issues Impact of social media Conflicts between openness, freedom and abuse Identity fraud  'Human flesh search' and online bullying Anonymity vs. calls for 'real name system' Example: Korea real name system for online games causing even more personal data leakages?  Information security issues SME and zombie networks -> Korean legislation  Mobile security
More threats What if your information security threat is from your Government? Great Firewall of China From Web 1.0 to Web 2.0 (e.g. Green Dam)  Centralizing Internet control under the State Council Moving from servers to personal devices From filtering to surveillance, i.e. government spyware Destabilizing VP, Gmail and 'Real Name System' Government surveillance on dissidents and their supporters on blocked services such as Twitter A trend for more governments in the world to imitate?
Resources Privacy Commissioner for Personal Data  www.pdpd.org.hk HK SAR Government's Infosec public website  www.infosec.gov.hk HK CERT  www.hkcert.org
莫乃光  Charles Mok [email_address] http://www.charlesmok.hk http://www.isoc.hk

More Related Content

PDF
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
PPT
Privacy and Data Security: Risk Management and Avoidance
PDF
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
PPTX
Data Privacy Introduction
PPTX
Privacy and Protection of Personal Information law seminar
PPTX
GDPR Is Coming – Are Emailers Ready?
PPTX
Unit 6 Privacy and Data Protection 8 hr
PDF
CSR PII White Paper
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Privacy and Data Security: Risk Management and Avoidance
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Data Privacy Introduction
Privacy and Protection of Personal Information law seminar
GDPR Is Coming – Are Emailers Ready?
Unit 6 Privacy and Data Protection 8 hr
CSR PII White Paper

What's hot (19)

PDF
Cloud primer
PPTX
Data Protection in India
PDF
California Consumer Privacy Act - What You Need To Know
PPTX
Be aware of the laws in South Africa that apply to email
PPTX
Data protection regulation
PDF
Personal Data Protection Law
PPTX
Be aware of the ICT laws that apply to your organisation
PDF
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
PPTX
Preparing for GDPR: What Every B2B Marketer Must Know
PDF
GDPR: how IT works
PPTX
California Consumer Privacy Act: What your brand needs to know
PPTX
Data privacy presentation
PPTX
GDPR Is Coming – Are Search Marketers Ready?
PPTX
GDPR- GENERAL DATA PROTECTION REGULATION
PDF
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
PDF
Cyber Claims Brief Summer 2016
PPTX
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
PPTX
General Data Protection Regulation for Ops
PPT
Privacy - USC 2005
Cloud primer
Data Protection in India
California Consumer Privacy Act - What You Need To Know
Be aware of the laws in South Africa that apply to email
Data protection regulation
Personal Data Protection Law
Be aware of the ICT laws that apply to your organisation
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Preparing for GDPR: What Every B2B Marketer Must Know
GDPR: how IT works
California Consumer Privacy Act: What your brand needs to know
Data privacy presentation
GDPR Is Coming – Are Search Marketers Ready?
GDPR- GENERAL DATA PROTECTION REGULATION
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
Cyber Claims Brief Summer 2016
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
General Data Protection Regulation for Ops
Privacy - USC 2005
Ad

Viewers also liked (8)

PPTX
The effects of Social Networking upon society
PPTX
Security models of modern mobile systems
PPTX
Impact Of IT on Society.
PPS
Introduction to Data Protection and Information Security
PPTX
Changes made by Information Technology (IT) in our Society
PPTX
Data Privacy and Protection Presentation
PDF
The effect of technology on today's society ppt
PPTX
Slideshare ppt
The effects of Social Networking upon society
Security models of modern mobile systems
Impact Of IT on Society.
Introduction to Data Protection and Information Security
Changes made by Information Technology (IT) in our Society
Data Privacy and Protection Presentation
The effect of technology on today's society ppt
Slideshare ppt
Ad

Similar to Personal Data Privacy and Information Security (20)

PPT
Chapter2
PDF
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
PPT
Policies and Law in IT
PPTX
Lofty Ideals: The Nature of Clouds and Encryption
PPTX
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
PDF
delphix-wp-gdpr-for-data-masking
PPTX
14-Computer Privacy and Security Principles.pptx
PDF
Companies, digital transformation and information privacy: the next steps
PDF
How Well Do You Know Data Privacy Laws_ Think Again!.pdf
PPTX
CHAPTER 5 CYBER LAW / SECURITY MALAYSIA
PPTX
The GDPR for Techies
PDF
Be careful what you wish for: the great Data Protection law reform - Lilian E...
PDF
Data Personal Privacy in the Age of Digital Improvement.pdf
PPTX
Police surveillance of social media - do you have a reasonable expectation of...
DOCX
Module 1- Living in the IT Era GE 12 FOR CHED
PPT
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
PDF
Sovereignty: the state of data
PPT
Security Regulatory Framework
PPTX
Lesson4-Privacy and Data Protection.pptx
PPT
Legal Perspective on Information Management “New Social Media – The New Recor...
Chapter2
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
Policies and Law in IT
Lofty Ideals: The Nature of Clouds and Encryption
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
delphix-wp-gdpr-for-data-masking
14-Computer Privacy and Security Principles.pptx
Companies, digital transformation and information privacy: the next steps
How Well Do You Know Data Privacy Laws_ Think Again!.pdf
CHAPTER 5 CYBER LAW / SECURITY MALAYSIA
The GDPR for Techies
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Data Personal Privacy in the Age of Digital Improvement.pdf
Police surveillance of social media - do you have a reasonable expectation of...
Module 1- Living in the IT Era GE 12 FOR CHED
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Sovereignty: the state of data
Security Regulatory Framework
Lesson4-Privacy and Data Protection.pptx
Legal Perspective on Information Management “New Social Media – The New Recor...

More from Charles Mok (20)

PDF
Lessons from DeepSeek: Democratizing AI and Open Source
PDF
Digital Democracy (Germany Taiwan Dialogue Platform event)
PDF
Taiwan's Digital Security Pillars: Cyber Infrastructure
PDF
The Future of Artificial Intelligence Governance
PDF
The Geopolitics of Undersea Cable Resilience
PDF
TWIGF Day 0 Tutorial: Security & Resilience
PDF
APAC Data Center Infrastructure Observations
PDF
Technology, Data and Ethics
PDF
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
PDF
Why open and interoperable Internet infrastructure is key to the Internet's c...
PDF
From Crypto to Trust and Identity
PDF
Have you AI'ed today? A Reality Check
PDF
The Trouble with "Fake News" Laws
PDF
2020-21 Budget -- New measures on I&T
PDF
2020-21年財政預算案——創科項目重點
PDF
在數碼時代阻止假新聞與捍衛言論自由
PDF
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
PDF
香港科技罪行法例改革:何去何從?
PDF
Driving Hong Kong Forward in the Age of 5G and Innovation
PDF
Computer Crime Law in Hong Kong
Lessons from DeepSeek: Democratizing AI and Open Source
Digital Democracy (Germany Taiwan Dialogue Platform event)
Taiwan's Digital Security Pillars: Cyber Infrastructure
The Future of Artificial Intelligence Governance
The Geopolitics of Undersea Cable Resilience
TWIGF Day 0 Tutorial: Security & Resilience
APAC Data Center Infrastructure Observations
Technology, Data and Ethics
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
Why open and interoperable Internet infrastructure is key to the Internet's c...
From Crypto to Trust and Identity
Have you AI'ed today? A Reality Check
The Trouble with "Fake News" Laws
2020-21 Budget -- New measures on I&T
2020-21年財政預算案——創科項目重點
在數碼時代阻止假新聞與捍衛言論自由
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
香港科技罪行法例改革:何去何從?
Driving Hong Kong Forward in the Age of 5G and Innovation
Computer Crime Law in Hong Kong

Recently uploaded (20)

PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPTX
The various Industrial Revolutions .pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
CloudStack 4.21: First Look Webinar slides
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
Modernising the Digital Integration Hub
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Unlock new opportunities with location data.pdf
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
Five Habits of High-Impact Board Members
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Hybrid model detection and classification of lung cancer
PPT
Geologic Time for studying geology for geologist
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Getting Started with Data Integration: FME Form 101
O2C Customer Invoices to Receipt V15A.pptx
The various Industrial Revolutions .pptx
DP Operators-handbook-extract for the Mautical Institute
CloudStack 4.21: First Look Webinar slides
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Modernising the Digital Integration Hub
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A novel scalable deep ensemble learning framework for big data classification...
Getting started with AI Agents and Multi-Agent Systems
Unlock new opportunities with location data.pdf
Web Crawler for Trend Tracking Gen Z Insights.pptx
Five Habits of High-Impact Board Members
Univ-Connecticut-ChatGPT-Presentaion.pdf
A comparative study of natural language inference in Swahili using monolingua...
Assigned Numbers - 2025 - Bluetooth® Document
Hybrid model detection and classification of lung cancer
Geologic Time for studying geology for geologist
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Hindi spoken digit analysis for native and non-native speakers
Getting Started with Data Integration: FME Form 101

Personal Data Privacy and Information Security

  • 1. Personal Data Protection and Information Security INET Colombo 2011 Session II: Making the Internet Safe for Everyone Charles Mok Internet Society Hong Kong 2011.05.23
  • 2. Privacy and Security Internet for all -> more problems? Growing awareness and media attention on personal data protection, privacy and information security Privacy legislation Security vs convenience and openness However, there is a contrasting attitude on others vs attitude on oneself
  • 3. Privacy Law in Hong Kong Personal Data Protection Ordinance, enacted in 1997. Enforced by the Privacy Commissioner for Personal Data Issue code of practice Investigate suspected breaches and issue enforcement notices Awareness and education 2010 Review of the ordinance
  • 4. Scope of the Ordinance The Ordinance covers any data relating directly or indirectly to a living individual (data subject), from which it is practicable to ascertain the identity of the individual and which are in a form in which access or processing is practicable. It applies to any person (data user) that controls the collection, holding, processing or use of personal data.
  • 5. Six Data Protection Principles Principle 1: Purpose and manner of collection Principle 2: Accuracy and duration of retention Principle 3: Use of personal data Principle 4: Security of personal data Principle 5: Information to be generally available Principle 6: Access to personal data
  • 6. Incidents – Leakages Public hospitals – staff losing USB thumb drives and other storage devices Police, immigration and fire departments* – leaking personal information and documents over P2P networks e.g. Foxy Banks – losing servers and tapes with customer transaction information Octopus (payment smartcard) – selling customer information to telemarketers and insurance companies
  • 7. Other Recent PCO Actions Google collection of WiFi payload data Google Street View car operation Sony PlayStation Network
  • 8. Emerging Issues Impact of social media Conflicts between openness, freedom and abuse Identity fraud 'Human flesh search' and online bullying Anonymity vs. calls for 'real name system' Example: Korea real name system for online games causing even more personal data leakages? Information security issues SME and zombie networks -> Korean legislation Mobile security
  • 9. More threats What if your information security threat is from your Government? Great Firewall of China From Web 1.0 to Web 2.0 (e.g. Green Dam) Centralizing Internet control under the State Council Moving from servers to personal devices From filtering to surveillance, i.e. government spyware Destabilizing VP, Gmail and 'Real Name System' Government surveillance on dissidents and their supporters on blocked services such as Twitter A trend for more governments in the world to imitate?
  • 10. Resources Privacy Commissioner for Personal Data www.pdpd.org.hk HK SAR Government's Infosec public website www.infosec.gov.hk HK CERT www.hkcert.org
  • 11. 莫乃光 Charles Mok [email_address] http://www.charlesmok.hk http://www.isoc.hk