Data Flows and Data Mirroring - PowerPoint PPT Presentation

1 / 13
About This Presentation
Title:

Data Flows and Data Mirroring

Description:

29e Confrence internationale des commissaires la protection de la vie prive ... Accuweather.com. Time.com. AOL. Fortune. Etc., etc., etc. ... – PowerPoint PPT presentation

Number of Views:128
Avg rating:3.0/5.0
Slides: 14
Provided by: privacycon
Category:

less

Transcript and Presenter's Notes

Title: Data Flows and Data Mirroring


1
(No Transcript)
2
Data Flows and Data Mirroring
Benjamin S. Hayes Americas Data Privacy
Compliance Lead Accenture, LLP
3
Data Flows and Data Mirroring
  • What data is flowing across borders, and where is
    it going?
  • Why is the data moving?
    What are the trends?
  • Predictions for the future
  • Outsourcingmyth and reality

4
Example 1 Commercial website
Content / functionality modules (not including
web advertisements) supplied by various third
parties
  • Dell
  • Careerbuilder.com
  • Google
  • People magazine
  • Yahoo
  • Accuweather.com
  • Time.com
  • AOL
  • Fortune
  • Etc., etc., etc.

5
Commercial Website (cont.)
  • Each module, in turn is likely powered by a
    service provider to Google, Time, AOL, etc.
  • These service providers may outsource part or all
    of the functionality to a subcontractor.
  • Data input through a module may be accessible to
    multiple parties in multiple geographies.
  • Virtually all of the controls to protect data
    will be contractual (as opposed to compliance
    with laws)

6
Example 2HR Outsourcing
  • Services typically involve providing the majority
    of personnel administration functions
  • Payroll
  • Benefits enrollment
  • Change of status
  • Communications to employees
  • Helpline for employee inquiries

7
How a hypothetical HRO is staffed
  • Assume client is in US, UK, NL and Belgium.
  • Deal may be signed in London between Client UK
    and Accenture UK
  • Accenture Consultants in US, UK, Argentina and
    Manila
  • Call centers in Buenos Aires, Warsaw, and Kuala
    Lampur to ensure 24 hr coverage.
  • Data processing in Bangalore
  • Printing / mailing performed by third party in
    US.

8
Why are services provided this way?
  • Primary reason cost
  • The search for efficiency and savings drives
    outsourcing
  • Strong pressure on public companies to produce
    profits for shareholders.
  • Secondary reasons
  • ability to distribute work to expert teams in
    various geographies,
  • 24 hour capabilities,
  • languages

9
Added complexitycommunications infrastructure
  • Servers are located in service locations, but are
    backed up on different continents for disaster
    discovery purposes.
  • Secondary backup servers (fail-over capacity)
    may be in yet another country.
  • The widely distributed service delivery team may
    use a private group website (hosted in Chicago,
    serviced from India) to collaborate on projects,
    share drafts, etc.
  • The advent of VOIP may mean re-examining
    assumptions about the privacy /security of voice
    communicationscaching, routing, clear-text
    packets, etc.
  • All of this means a complex web of Model Clauses
    and other data transfer agreements must be
    applied to follow the datadifficult to
    administer.

10
Predictions for the future
  • The distribution of data and segmentation of
    business processes is driven by economics and
    improvements in information technology.
    Bandwidth availability will continue to improve,
    which will drive further distribution of data and
    segmentation of business processes.
  • More businesses will engage in transitory data
    processing instead of traditional controllership.
  • Business realities require consistent
    administration of data from many sourcesthis
    means there is economic demand for harmonized
    international rules regarding data sharing,
  • Increased or disharmonized regulation that
    interferes with transborder data flows will mean
    some economic efficiencies are unrealized.
  • Territorial limits on transborder data flows may
    do little to address actual risksa risk-focused
    (rather than territorial) regulatory regime would
    be more protective of consumer interests.

11
Outsourcing Myths
  • Work is performed in substandard conditions,
    employing uneducated, untrustworthy people.
  • Information security standards are lax.
  • Data is necessarily less safe than it would be in
    its home country.

12
OutsourcingReality
  • Work is performed in modern business conditions
    by educated, trained, screened personnel
  • Information security standards are extremely
    strict
  • Data is safer than it might be in many other
    places

13
Accenture Delivery Centers are focused on
security expectations and are audited
  • Bangalore has been certified at Level 3 of the
    eSourcing Capability Model for Service Providers
    by Carnegie Mellon University1st outsourcer in
    the world to receive this designation
  • 17 Accenture delivery locations to receive SAS
    70 Level II audits in 2007
  • 8 centers are currently compliant with ISO 27001
    3 more will be added in October, 2007 (represents
    most of Accentures outsourced service delivery
    locations) variety of other standards
    certifications in place.
  • Global mandatory training on data privacy for all
    personnel
Write a Comment
User Comments (0)
About PowerShow.com