Report Data Privacy and Data Security 2013
Total Page:16
File Type:pdf, Size:1020Kb
U e sM In e Federal I rI In Federal U F n or It secUrIty d FIrewall U a P M sIMko 3 Protect ta F at ght to to ght F art PasswordbI encryPtIon or d I secUrIty gUIdelIne g data onal sel dates eUroPean coMMIssIon law coMPlIance or data a sensItIvIty cybersPace basIc rIght eUroPean coMMIssIon sel In data ProtectIon standards M ta Protect ta U eMP econoMy P I contIngency Plan F on -deter hone hacker at M P r eg secUrIty d MI dates dates F U ManageMent F lat nat at a data PrIvacy I onal sel -deter d I ta Protect ta I certIFIcatIon on or on t Freedo data secUrIty Ident ab c eU Federal loyee data data loyee eUroPean coMMIssIon a bI g data o I ta Protect ta let P cyber- on cert MMI d ro I a ty Manage cloUd - sPace Protect ta trUst It secUrIty M w P M ss c s secUrIty gUIdelInes ass certIFIcatIon cert ord P MI ec coMPUtIng I I on on I F ean on at - a cert sIMko 3 -deter ct nat word Pass- encryPtIon M exPerts U IntegrIty groUP ent coMPlIance I on r secUrIty exPerts cert r cybersPace eUroPean coMMIssIon h e U I secUrIty U selF-deterMInatIon eg I IntegrIty ty Pol d I oney a a sMart- onal P ta Protect ta on contIngency Plan ct MI U Phone I honeyPots dates Personal PrIvacy on lat eUroPean nat s sM coMMIssIon t P rans t cryPtograPhy e c sec g In I ens on tablet-Pc art F cyber secUrIty P rans or ry ncry r a r M P ots eg I ro I aren at ct P I c U on P on hone I I lat onal sel togra U vacy I I cy I P on es 2.0 t hacker r sI U aren FreedoM data I F P P -deter UP v M certIFIcatIon I dates ty t rUles I Personal k ty I MI P IdentIty ManageMent o 3 on rIght to InForMatIon nat PrIvacy bIg cy hy trUst cert basIc rIght certIFIcatIon Personal I on Password Personal PrIvacy UPdatescert PrIvacy secUrIty ManageMent rUles c lo U U d P c eUro- o dates MPU t Pean I ng coMM- Password In cyber c eU IssIon F Personal or yber sec yber eUroPean coMMIssIon It secUrIty ro M hacker groUP at PrIvacy cert P secUrIty I data PrIvacy ean onal sel encryPtIon secUrIty secUrIty FIrewall ManageMent law It secUrIty law bIg data data PrIvacy sensItIvIty secUrIty c secUrIty gUIdelIne UPdates certIFIcatIon basIc rIght UPdates t e gUIdelIne c In o F basIc rIght -deter F rans MMI or ry ncry U Personal M sensItIvIty Pass- at Personal r MI ss P I onal sel PrIvacy nat I It secUrIty law togra word ty I on sMartPhone IntegrIty Federal data ProtectIon act sensItIvIty P I on eUroPean aren PrIvacy eUroPean coMMIssIon cloUd coMPUtIng cert transParency FIrewall F P encryPtIon coMMIssIon -deter data ProtectIon standards cyber- cyber secUrIty t Pass- I FIre- Password FIre- MI honey- P IdentIty on sPace tr data PrIvacy oFFIcer nat cryPto- Inte- cy hy word grIty U cryPto- sIcherheIts- coMPlIance Pots rIght to InForMatIon I st wall cloUd coMPUtIng wall on cert bIg data transParency FIrewall Ident c eU I rI graPhy graPhy Federal exPerten rUles tablet-Pc n tablet-Pc o sMart- honeyPots MMI ght to to ght F bI d Phone ro I a cloUd cert ty Manage g data coMPlIance vertraU- Protect ta eUroPean or rUles coMMIssIon lIchkeIt ss transParenz tablet-Pc P coMPUtIngtrUst tablet-Pc I I on sMart- on ean cloUd- M a ct Pass- Phone word Pass- dIenste M at eUroPean ent coMMIssIon FreedoM PrIvacy word arbeItnehMer- t Freedo tablet-Pc datenschUtz cyber secUrIty ablet P UPdates trUst gUIdelInes Federal data ProtectIon act I basIc rIght hacker encryPtIon on sensItIvIty secUrIty gUIdelIne secUrIty aUdIt sMartPhone cyber ManageMent transParency Inte- It secUrIty law InForMatIonal selF-deterMInatIon data ProtectIon standards data PrIvacy cyber M cert c certIFIcatIon cryPtograPhy secUrIty UInForPMatIonaldates selF-deterMInatIon secUrIty cert In transParency eU sMart- U grIty Personal Pass- eUro-P cryPto- dates tablet-Pc F PrIvacy Phone eUroPean coMMIssIon Pean or word groUP eUroPean PersönlIchkeItsschUtz graPhy groUP gUIdelInes coMMIssIon coMM- basIc rIght ro FIrewall FreedoM Password In UPdates c tablet-Pc IssIon geheIMcode eU sIMko 3 secUrIty M secUrIty F or eUroPean coMMIssIon yber sec ro at M at P P encryPtIon I ean InForMatIonal InForMatIonal onal sel I It secUrIty law ean onal sel cert c secUrIty gUIdelIne e s selF-deterMInatIon eU selF-deterMInatIon I eUroPean coMMIssIon t o ec F gUIdelInes -deter ncry ro MMI cyber- s U U sIMko 3 ec honey- P r r MI encryPtIon ss sPace secUrIty exPerts FIre- ean I nat I It secUrIty wall ty U coMPlIance ty Pots I gUIdelInes cloUd coMPUtIng on I r c on cybersPace secUrIty ManageMent c Password certIFIcatIon gUI U h eUroPean coMMIssIon e h e o tablet-Pc U I P honeyPots U encryPtIon U ty MMI tr d basIc rIght d o oney oney t a a U geheIM- del P cyber- F ta Protect ta P st ta Protect ta I l -deter ss legal on dates sPace a MMI dates code I I ne It secUrIty on w aFFaIrs cloUd- cloUd coMPUtIng gUIdelInes certIFIcatIon eU eMP I tablet-Pc I s on dIenste Federal on P It secUrIty P r It secUrIty r ots eg ots encryPtIon eg ec U U MI lat lat ss transParency ro d law law InForMatIonal selF-deterMInatIon I a sensItIvIty I on sMartPhone on sensItIvIty ta Protect ta cloUd coMPUtIng secUrIty ManageMent FIrewall FreedoM trUst nat I s t basIc rIght d t basIc rIght loyee data data loyee a cryPtograPhy rans ta ta ens I s tablet-Pc hacker U P on sIMko 3 ec P encryPtIon rotect hacker Pass- secUrIty I on coMPlIance U secUrIty ManageMent ean I on P word r I cybersPace r ManageMent cybersPace data PrIvacy aren t eUroPean coMMIssIon I certIFIcatIon on standards I a data PrIvacy ct In ty coMPlIance eUroPean coMMIssIon I certIFIcatIon gUIdelInes v I l F secUrIty exPerts I ty or ty a Federal data ProtectIon cy aUdIt M secUrIty ManageMent w at c data PrIvacy oFFIcer cyber I Ident c eU cloUd coMPUFederal tIng onal sel Federal data ProtectIon act InForMatIonal selF-deterMInatIon IdentIty ManageMent cert cert secUrIty o tablet-Pc o sMart- cert MMI eMPloyee data PrIvacy legal gUI It secUrIty d FIre- ro I cert a MMI ty Manage aFFaIrs Protect ta IdentIty P hone F anonyMIzatIon -deter Personal aUdIt FreedoM cyber secUrIty wall ss PrIvacytrUst anonyMIzatIon UPdates UPdates P ManageMent anonyMIzatIon I coMPlIance I on cyber secUrIty gUIdelInes on InForMatIonal selF-deterMInatIon MI P ean a secUrIty PolIcIes 2.0 ct nat eUroPean word Pass- M r ss del rIght to InForMatIon Pass- aUdIt ent Password I coMMIssIon on Ident Federal data ProtectIon act word cyber cyber secUrIty data PrIvacy oFFIcer I FIrewall U e sM IdentIty ManageMent In cert vacy eUroPean coMMIssIon secUrIty eUroPean coMMIssIon U F I or gUIdelInes d a P on M ta Protect ta I ty Manage encryPtIon at a cert art IntegrItyU I groUP aUdIt onal sel dates transParency d secUrIty PolIcIes 2.0 I InForMatIonal selF-deterMInatIon t I cyber secUrIty P cert ne secUrIty I F trUst cryPtograPhy on -deter exPerts secUrIty M hone U sMart- r ent eUroPean coMMIssIon eUro-P legal eg dates MI U transParency Phone cert lat eMPloyee data PrIvacy Pean nat aFFaIrs anonyMIzatIon eUroPean I I coMMIssIon coMM- on InForMatIonal selF-deterMInatIon UPdates IssIon on tablet-Pc FreedoM tablet-Pc Data Privacy anD Data Security Report 2013 Life iS for Sharing. CONTENTS 4 “We must restore confidence,” says Dr. Thomas Kremer, Board member for Data Privacy, Legal Affairs and Compliance. “The European Data Protection Regulation is a market opener” believes Viviane Reding, Vice- President of the European Commission. 6 20 25 Big Data: Boon or bane? An interview with Reinhard Clemens, member Dr. Bernhard Walter chairs Telekom’s Audit Committee. of the Board of Management of Deutsche Telekom AG and CEO of The former Speaker of the Board of Dresdner Bank T-Systems, and Dr. Claus-Dieter Ulmer, Group Data Privacy Officer, explains the role of data protection and data security for Deutsche Telekom. this body. 12 Wolfgang Kopf, Senior Vice President Group Public and 22 “Cloud computing is a matter of trust,” says data Regulatory Affairs at Deutsche Telekom, sees opportu- rescue specialist Peter Franck, a member of the nities for European businesses in the wake of the NSA Chaos Computer Club and of Telekom’s Advisory affair. Council on Data Privacy. 13 Data protection based on the need-to-know principle 23 Dr. Claus-Dieter Ulmer, Group Data Privacy Officer, describes the state of data privacy in the Business 14 Wireless cell transmission for mobile emergency calls Marketplace. / Rules of the game for foreign security authorities / Traffic data for German security authorities / Telekom 24 New edition of data protection guide / Status report on has uniform worldwide data protection guidelines / New data privacy governance model 31 Cyber Security Summit 16 On-site audits by Group Privacy / Map of data protection risks / How well do Telekom employees know about data 32 Facts and figures on data privacy and data protection protection? / Virtual school / International data protec- tion on tour 35 Carglass: customer data is our most precious asset 18 Executive information system / Data protection at school 36 Abuse: race against the spammers / Anonymization tool / Data privacy and data security in the coalition agreement / User-friendly data protection 37 “ IT security is an issue that should be on every senior information management agenda,” says Thomas Tschersich, Senior Vice President Technical Security at Telekom.