BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//HasGeek//NONSGML Funnel//EN
DESCRIPTION:Balancing scale\, with privacy and utility is doable.
X-WR-CALDESC:Balancing scale\, with privacy and utility is doable.
NAME:Scalable Data Privacy Engineering
X-WR-CALNAME:Scalable Data Privacy Engineering
REFRESH-INTERVAL;VALUE=DURATION:PT12H
SUMMARY:Scalable Data Privacy Engineering
TIMEZONE-ID:Asia/Kolkata
X-PUBLISHED-TTL:PT12H
X-WR-TIMEZONE:Asia/Kolkata
BEGIN:VEVENT
SUMMARY:Introduction to the conference and emcee
DTSTART:20210820T083000Z
DTEND:20210820T083500Z
DTSTAMP:20260415T193004Z
UID:session/Sy6XCi1GtHKKHDS9yo5EfS@hasgeek.com
SEQUENCE:0
CREATED:20210817T055659Z
LAST-MODIFIED:20210817T055659Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Introduction to the conference and emcee in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Introduction to the flow of the conference
DTSTART:20210820T083500Z
DTEND:20210820T084000Z
DTSTAMP:20260415T193004Z
UID:session/4KXsxXowtFr8YHu3qLZdqR@hasgeek.com
SEQUENCE:0
CREATED:20210817T055750Z
LAST-MODIFIED:20210817T055750Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Introduction to the flow of the conference in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:May I have my Data Please?
DTSTART:20210820T084000Z
DTEND:20210820T091000Z
DTSTAMP:20260415T193004Z
UID:session/UpfRs3qRS3by7FwumEzaza@hasgeek.com
SEQUENCE:1
CREATED:20210816T033355Z
DESCRIPTION:\n\nIn a world where we collect as much user data to make thei
 r journey as personalized as possible\, it’s also important to adhere to
  compliance requirements where a user can request both deletion (forget) o
 r a dump (access) of their data. As a centralized data-platform team\, thi
 s was a huge challenge for us at Disney + Hotstar. Owning the platform\, w
 hile various teams owned the data meant that we had to provide a distribut
 ed way for every team to support data-subject requests while coordinating 
 & orchestrating it altogether at the same time. In this talk\, we discuss 
 the various approaches we considered & discuss the architecture of handlin
 g data-subject requests that allows us to scale as more systems (as well a
 s the data they use) grow within the ecosystem.\n
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:May I have my Data Please? in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Data Deletion Practices at LinkedIn's Offline Data Lake
DTSTART:20210820T091000Z
DTEND:20210820T094500Z
DTSTAMP:20260415T193004Z
UID:session/A111TL76cFjY4ukzVEZp9t@hasgeek.com
SEQUENCE:1
CREATED:20210711T105550Z
DESCRIPTION:LinkedIn works at exabyte data scale and respecting the privac
 y of its Members is the top most priority as part of LinkedIn culture and 
 the core value “Members first”. This talk will briefly touch upon some
  of the practices\, tools & technologies used in offline data lake for adh
 erence to GDPR “Right to erasure”. Talk will also cover the lessons le
 arned and challenges faced while talking in detail about the offline GDPR 
 data deletion architecture.
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/scalable-data-privacy-engineering-conf/sc
 hedule/data-deletion-practices-offline-data-lake-A111TL76cFjY4ukzVEZp9t
BEGIN:VALARM
ACTION:display
DESCRIPTION:Data Deletion Practices at LinkedIn's Offline Data Lake in 5 m
 inutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Break
DTSTART:20210820T094500Z
DTEND:20210820T095000Z
DTSTAMP:20260415T193004Z
UID:session/8uARrpMCMzVFTLkLhjrFFt@hasgeek.com
SEQUENCE:0
CREATED:20210817T055813Z
LAST-MODIFIED:20210817T055813Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Break in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Panel: Handling Data Deletion Requests in Fintech
DTSTART:20210820T095000Z
DTEND:20210820T103000Z
DTSTAMP:20260415T193004Z
UID:session/Vc6jxS5HUE1sLSdKNvBWGS@hasgeek.com
SEQUENCE:1
CREATED:20210817T065523Z
DESCRIPTION:This session discusses:\n\n1. How do laws and regulations defi
 ne data deletion - GDPR\, CCPA and others?\n2. What are the unique challen
 ges of fulfilling data deletion requests in the Fintech domain under these
  compliances?\n3. Data management (for data deletion) war stories.\n4. Dat
 a discovery (for data deletion) war stories.\n5. Conclusion\; projections 
 for India's PDP Bill and handling data deletion.   
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Panel: Handling Data Deletion Requests in Fintech in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Break
DTSTART:20210820T103000Z
DTEND:20210820T103500Z
DTSTAMP:20260415T193004Z
UID:session/Sp6SMJd8eFBGUiviXixBdY@hasgeek.com
SEQUENCE:0
CREATED:20210817T065543Z
LAST-MODIFIED:20210817T065543Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Break in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Data Deletion: Explaining the legal requirements: timelines and ex
 ceptions and case laws.
DTSTART:20210820T103500Z
DTEND:20210820T110500Z
DTSTAMP:20260415T193004Z
UID:session/K9WgG3nuVQNR18eykcDpLs@hasgeek.com
SEQUENCE:1
CREATED:20210816T033055Z
DESCRIPTION:Whether your products and services are B2B or a B2C\, you need
  to be aware of legal requirements that your technological solutions are r
 equired and expected to fulfil so that you can design those products and s
 ervices in accordance with those requirements from the beginning.\nRight o
 f Deletion is not absolute. To be able to comply with the requirements for
  deletion of data\, one needs to be aware of the situations in which delet
 ions are necessary under CCPA and GDPR\, the timelines within which deleti
 ons must take place\, and exceptions that permit you to refuse to delete d
 ata in certain situations. While dealing with exceptions\, it is important
  to carefully consider what is and what is not permitted\, and how to act 
 when taking the benefit of an exemption. One of the exceptions that permit
 s retention of data under GDPR is if you have a legitimate interest that o
 verrides the rights and freedoms of the person whose data is concerned. In
  one case in Hungary\, a person had made a request for deletion of telepho
 ne numbers. The company refused to delete that data stating that they have
  a right to retain it until the debt due from the person to the company is
  paid off. The Hungarian DPA ruled against the company and held that for l
 egal procedures\, it would be sufficient for the company to retain that pe
 rson’s address\, so the company’s justification for retention of telep
 hone numbers is not sufficient\, and those numbers must be deleted.\n \nIn
  addition to the above\, you need to be aware of all agreements with all s
 ervice providers and must ensure that measures have been taken to ensure t
 hat compliance can take place in the entire chain. For example\, if you de
 lete the data within the permitted time limit\, but your service provider 
 maintains copies of the data beyond the permitted time limit\, then you wo
 uld be in violation of your legal obligations.\n \nWithin an organization\
 , there are multiple roles that must be made aware of these requirements. 
 These include the developers\, marketing department\, customer service\, a
 cquisitions\, and legal\, as each of them is responsible for separate part
 s of the overall compliance requirements. The weakest link in compliance i
 s the customer service department as seen from experience. \n \nIn this ta
 lk\, we will discuss the above with regards to the deletion of data under 
 CCPA and GDPR\, as well as the outcomes of a few cases that have been deci
 ded in EU. Best practices to be implemented. \nThe right is not limited to
  users but extends to ex-employees also. Verification of the deletion requ
 est is another important aspect.\n In India too courts have recognized Rig
 ht to deletion. Therefore\, in coming times this request could from multip
 le jurisdictons across the globe.\n
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/rootconf/scalable-data-privacy-engineering-conf/sc
 hedule/data-deletion-explaining-the-legal-requirements-timelines-and-excep
 tions-and-case-laws-K9WgG3nuVQNR18eykcDpLs
BEGIN:VALARM
ACTION:display
DESCRIPTION:Data Deletion: Explaining the legal requirements: timelines an
 d exceptions and case laws. in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Protect the Pie (PII)
DTSTART:20210820T110500Z
DTEND:20210820T113500Z
DTSTAMP:20260415T193004Z
UID:session/TcZrN6qsXRHnteuPqabJR6@hasgeek.com
SEQUENCE:1
CREATED:20210816T033511Z
DESCRIPTION:\n\nCore to data-security is the user’s personally identifia
 ble information. As Disney + Hotstar grows internationally\, with increasi
 ng compliance restrictions\, we’ve re-architected our entire data-platfo
 rm to support differing compliance & security requirements. We make the us
 er’s personally identifiable information impossible to access unless abs
 olutely necessary. In this talk we discuss how we use masking & filtering 
 while ingesting\, storing and processing data\, and how systems that acces
 s data for analytics\, personalization\, targeting\, reporting were accomm
 odated to fit this new world. We discuss the paradigm shift in approaching
  the data from a user’s point of view instead of a use-case point of vie
 w\n
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Protect the Pie (PII) in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Conclusion - summary and takeaways
DTSTART:20210820T113500Z
DTEND:20210820T114000Z
DTSTAMP:20260415T193004Z
UID:session/2uqWfXB8QNM3x3FbtmkQyh@hasgeek.com
SEQUENCE:0
CREATED:20210817T060923Z
LAST-MODIFIED:20210817T065551Z
LOCATION:Online
ORGANIZER;CN=Rootconf:MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Conclusion - summary and takeaways in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
END:VCALENDAR
