Control – Alt – Delete: Control Data, Use Alternatives, and Delete Risks APRIL 30 PRIL 30 – MA MAY 2 Y 2, 2 , 2018 Keynote Address: Big Data/Big Privacy Keynote Speaker: Nora Young (Host & Creator, Spark (CBC)) As individuals, we’re generating more data all the time about our movements, habits, and tastes. We’re on the cusp of a Data Boom, a new era in information, fueled by our digital devices. It will offer new personal insights, open opportunities for new services, and change the nature of our cities and communities. The Data Boom has the power to make our personal lives and communities better, but it also carries tremendous privacy risks. Drawing on her book, and her experience as host and creator of CBC’s technology show, Spark, Nora explains how this Data Boom will change society, and what it means for individuals, businesses, and communities.
Control – Alt – Delete: Control Data, Use Alternatives, and Delete Risks APRIL 30 PRIL 30 – MA MAY 2 Y 2, 2 , 2018 Keynote Address: Cybersecurity Keynote Speakers: Travis Barlow and Derrick Westhaver (GoSecure Inc.) This session will discuss: - the types of threats GoSecure Inc. has observed at its Advanced Response Centre (ARC) over the past year from its global client base; - the motivation behind the threat actors; - what has worked well to detect and defend; and - what we expect to see in the next year.
Control – Alt – Delete: Control Data, Use Alternatives, and Delete Risks APRIL 30 PRIL 30 – MA MAY 2 Y 2, 2 , 2018 Breakout Session #1A: Secondary Use of Data in Health Research - Ethics, Data Access, and Privacy Considerations Panelists: Michael Bannister (Government of NL (HCS)), Sean Murray (OIPC), Donna Roche (NLCHI) and Sandra Veenstra (HREA) This session will focus on the ethics, data access, and privacy considerations of the secondary use of data in health research. Topics to be addressed will include best practices for access to data, privacy, information management and information security. Ethical considerations related to privacy and consent, as well as the various approval processes that need to be in place prior to access or disclosure, will be reviewed in the local context. Open discussion with session attendees will be encouraged regarding how other jurisdictions manage the ethics review of research that relies on data held by external organizations and how data custodians process requests for secondary use of data for research purposes.
Control – Alt – Delete: Control Data, Use Alternatives, and Delete Risks APRIL 30 PRIL 30 – MA MAY 2 Y 2, 2 , 2018 Breakout Session #1B: Expanding Telehealth in Newfoundland and Labrador Speaker: Ashley Dinn (NLCHI) Telehealth enables the delivery of equitable health services to patients in Newfoundland and Labrador regardless of location. By reducing the need for patients, family, and health care specialists to travel for medical appointments, Telehealth enhances the continuity and capacity of care throughout the health care system. In a province like ours, with its vast geography, dispersed and aging population, harsh weather conditions and growing health care demands, Telehealth works to close the gaps resulting from these challenging realities. As of March, 2018 Telehealth is accessible in over 64 communities and 104 health care facilities. Under the Newfoundland and Labrador Centre for Health Information’s (NLCHI) leadership and in continued collaboration with the regional health authorities and the Provincial Government, Telehealth is reducing barriers and closing gaps in the health care system. Telehealth enables many residents to avail of specialized and critical health care services without leaving their communities. Medical specialists can consult, treat and manage care without having to be in the same room with their patients. With a focus on chronic diseases prevalent in our province, in addition to oncology, nephrology, diabetes, mental health and neurology, the benefits and opportunities for Telehealth in Newfoundland and Labrador are being recognized. The Provincial Telehealth Program is currently expanding to bring these services into Primary Health Care and within the client’s home. NLCHI is establishing a provincial Telehealth infrastructure to meet the growing demands on the health care systems and allow new ways to deliver health care across the province. This presentation will examine the importance of privacy and security of the provincial telehealth infrastructure, responsibilities for the Provincial Telehealth Program, and current expansion opportunities.
Control – Alt – Delete: Control Data, Use Alternatives, and Delete Risks APRIL 30 PRIL 30 – MA MAY 2 Y 2, 2 , 2018 Breakout Session #1C: The Evolution of Enterprise Content Management: How APSIM Practitioners can Maximize Benefits Speaker: Lori Collins (CNA) Through 2017 industry experts, bloggers and associations took turns trying to redefine and rebrand Enterprise Content Management (ECM). AIIM, the leading ECM professional association, was in such agreement with a January 2017 Gartner blog post titled "The Death of ECM and Birth of Content Services" that reflected that "ECM is now dead (kaput, finite, an ex-market name)" that announced it would replace ECM with the term Intelligent Information Management (IIM). This new term would encompass the management of data and content, not just content by itself. But what does it mean for the Access, Privacy, Security and Information Management (APSIM) professionals on the ground? Is there a way to harness this new approach to benefit a wide range of APSIM practices? This presentation will review the evolution of ECM and show just how this new approach can help APSIM professionals tackle some of their highest priority challenges.
Control – Alt – Delete: Control Data, Use Alternatives, and Delete Risks APRIL 30 PRIL 30 – MA MAY 2 Y 2, 2 , 2018 Breakout Session #2A: Information Asset Management Speaker: Donna O’Toole (Government of NL (OCIO)) Managing information assets involves stakeholders from the fields of access, privacy, security and information management. Broadening your information technology awareness can support your IM program’s abil ity to monitor and verify IM performance and compliance. A managed IM program supports compliance in all our fields of practice. Learn about your role in the many enterprise responsibilities undertaken by your organization each day. Account Setups, Active Directory, Network Security Groups and Email Distribution Groups Standard Document and Forms Management Collaboration Tools (Intranet and Extranet) Employee Orientation including exit strategies Corporate culture and employee engagement
Control – Alt – Delete: Control Data, Use Alternatives, and Delete Risks APRIL 30 PRIL 30 – MA MAY 2 Y 2, 2 , 2018 Breakout Session #2C: Fees & Costs Associated with ATIPP Requests Panelists: Stacey Pratt (OIPC) and Jennifer Taylor (ATIPP Office) Under Section 25 of the Access to Information and Protection of Privacy Act, 2015 , the legislation lays out where and when it is appropriate to charge an applicant for the processing of a request. As this has changed substantially since previous iterations of the legislation, it has changed how coordinators must approach the processing of large requests, but has also ensured the ATIPP process is accessible to all in the public, without limiting by financial ability. In this session, we will look at some of the opportunities and challenges presented through the revised legislation.
Control – Alt – Delete: Control Data, Use Alternatives, and Delete Risks APRIL 30 PRIL 30 – MA MAY 2 Y 2, 2 , 2018 Plenary Session: Privacy Tools Panelists: Blaine Edwards (Government of NL (HCS)), Jennifer Taylor (ATIPP Office), and Ruth Marks (OIPC) There are a number of privacy tools available for practitioners, including preliminary privacy impact assessments/privacy impact assessments (PPIAs/PIAs), policies and procedures, training, agreements, audits, and privacy management programs. Sometimes it is difficult to identify the best tool for the task at hand and determine which tools to action first. Using a hypothetical scenario involving a newly created organization, this presentation will teach participants about the most appropriate tool for the situation, as well as how to prioritize tasks. Panelists will also highlight the resources and tools available specific to the Access to Information and Protection of Privacy Act, 2015 ( ATIPPA, 2015) and the Personal Health Information Act ( PHIA) .
Recommend
More recommend