Make a submission
Accepting submissions till 30 Sep 2022, 11:55 PM
Organizations desire to adopt best practices around data which are aligned with the risk management approaches they have in place. With increasing complexity around privacy and data security, it is necessary to gain deep understanding of the strategic directions adopted at some of leading organizations in India. With this intent, the Privacy Mode Fellowship programme was put together to work with practitioners who document easily adopted practices that are flexible and are based on well understood design principles. The Best Practices Guides provides a quick introduction to some of the topics which receive a lot of attention.
The Privacy Mode Fellowship programme considered the following themes while publishing the Call for Submissions:
The following abstracts provide an insight into the topics covered by them. The abstracts are linked to the complete reports:
1. [Uzma Barlaskar](https://www.linkedin.com/in/uzmabarlaskar/), Head of privacy and growth at WhatsApp.
2. [Anand Venkatanarayanan](https://twitter.com/iam_anandv), Independent cybersecurity researcher.
3. [Sankarshan Mukhopadhyay](https://www.linkedin.com/in/sankarshan/), Editor at Privacy Mode.
For queries about the Fellowship Programme, mail privacymode@hasgeek.com or leave a comment in the comments section
View acceptance criteria for the fellowship program 👉 here
Hosted by
Supported by
Accepting submissions till 30 Sep 2022, 11:55 PM
Not accepting submissions
We are inviting applications from practitioners working on the following topics to participate in the Fellowship Programme:
To apply for the Fellowship, submit the following:
Accepting submissions till 30 Sep 2022, 11:55 PM
SK
S Kannan Frappe: GDPR Compliance for ERPSummary # Frappe is a Software as a Service (Saas) company in the Enterprise Resource Planning (ERP) domain and it also provides hosting services through its Frappe Cloud product. It handles sensitive information of businesses including company documents, financial records, accounting statements, employee details, assets etc. In order to serve its EU customers, Frappe is mandated to be GDPR compl… more
|
Doosra: Protecting your mobile numberSummary # Doosra provides an alternative virtual number to the primary phone number to protect our privacy. In today’s interconnected world, we share our mobile number everywhere, and in return receive unwarranted messages and calls. Doosra provides a platform that gives the user control to allow or restrict access. The entire solution has been designed keeping privacy at the core. more
|
Zerodha: Data protection, security and privacy practicesSummary # Zerodha provides an online platform in India to invest in stocks, derivatives, mutual funds, bonds, futures and options, and serves over 9+ million clients. In the financial services industry, it is mandatory to be compliant with the strict regulations that are enforced by multiple authorities. Zerodha has developed a solution to extend their existing microservices architecture and be f… more
|
Zeotap: Privacy in Data as a Service (DaaS) businessSummary # Zeotap, which now has more than one hundred partners, runs a data business offering managed services for data sets. It operates on Data as a Service (DaaS) and Software as a Service (SaaS) models, and provides integrations with cloud exchanges and APIs with SLA guarantees. In order to cater to its EU customers, it became compliant with the General Data Protection Regulation (GDPR) in 20… more
|
AS
Ankita Roychoudhury & Yashodhara Shukla Practices to ensure Data Protection and opting for best Security practices to prevent data breaches.STATEMENT OF PURPOSE Privacy is recognised as one of the most important rights conferred on the citizens in the present century. In India, Privacy is recognised as a fundamental right well within the contours of Article 21, in the landmark judgement of K.S. Puttaswamy v Union of India. The aftermath of this led to the formation of the Joint Parliamentary Committee headed by Justice Srikrishna for… more
|
SS
Sathish K S ![]() GDPR & Compliance For Data BusinessStatement of Intent & Purpose I had the opportunity to closely work with various stakeholders to ensure the privacy and “Governance, Risk & Compliance” posturing of my company Zeotap was adequate to enable our data business in EU and US. This was by virtue of my position of current CTO and past VP of Engineering at Zeotap. Zeotap has 2 offerings one as Data-as-a-service and another is data platfo… more
|
PP
Pratyush Pullela Data Protection and Security Practices at DoosraStatement of Purpose The problem that we at Doosra are trying to solve is simple, with a wide ambit of uses across multiple platforms. We are solving the issue that plagues people daily - is it is prudent to share our number on XYZ platform and what can be the ramifications of doing so? When was the last time any of us had to share our number on a website and had to think twice if it is safe to d… more
|
RV
Rohan Verma Data Protection and Security Practices at ZerodhaStatement of intent and purpose # Proper access control and appropriate proliferation of critically-sensitive customer data across a variety of internal apps can be a complex beast. Using a few common-sense privacy principles along with a few architectural changes across the organization; it is straightforward to fortify and prevent data proliferation across the stack. At Zerodha, we have built a… more
|
MS
Mahima Sood Statement of PurposeI’ve often found myself going to Ray Kurzweil’s words from “Singularity is Near”, where he talks about epochs. We are at the edge of epoch 5, where humans and machines are uniquely poised in an interdisciplinary collaboration. In today’s corollary, data is more valuable than oil. Machines are used to harvest and mine data, which in turn is used to determine the policies that govern us. This range… more
|
aj
akansh jathan Application for Privacy Mode Fellowship Program | AkanshHi, Apologies for the late application. My name Akansh Jathan, am currently working at Network Intelligence India as a Cyber Security Analyst. I am currently working in application vulnerability management for a client, here I conduct pentest, share and track findings, and help mitigate security issues as per SLA. I have around 3 years of experience in Information Security. more
|
Acceptance criteria for the fellowship programConversations around privacy and data security are increasing everyday. The government has tabled a Personal Data Protection bill in the parliament, and a Joint Parliamentary Committee has presented its report on the potential and concerns regarding privacy and personal data. more
|
Hosted by
Supported by