IBM Systems Magazine, Mainframe - July/August 2016 - 22

R&D

One of the things we do is
provide tools to help define
the policies, and for a privacy
officer who certifies particular
applications for a purpose. For
example, say I created an app
for tracking personal fitness.
That app would be certified
for personal fitness tracking.
It would not be certified for
marketing or advertising or other
things. Any query coming out
of that app is certified only for
fitness tracking.
ISM: How does your content
management solution
address this?
SN: Let's go back to my example
of the fitness app. The developer
has defined a database schema
that holds things like my name,
my location, where I ran and what
time of day I ran. The information
collected about me when I use the
fitness app is stored in the database as defined by the schema.
As the privacy officer, I am
going to sit down with the
developer, look at the schema
and say, "Ah, this piece of
data-a name, an address, where
the person ran-is sensitive
information, and it will flagged
as such." Then, I'll define the
policies around the sensitive
information. For example,
maybe some of the data needs
to be stored throughout the year.
Maybe some of it only needs to be
stored for a short amount of time,
depending on its use. If I'm a
retailer receiving this information
from you, I only need the data
long enough to send you a coupon

Learn more about consent
and privacy policy
management:
youtube.com/
watch?v=R5CnVN
HK0rU

"Although products that do data access auditing are
available on the market today, they don't take into
account to whom the data belongs or the purpose
for which it was accessed."
-Sima Nadler, senior program manager for privacy and worldwide
research lead for retail, IBM Research

for running shoes. How long the
data needs to be stored is very
different for the retailer than for
the fitness tracker, for example.
So, you have tools for defining
all of those policies about the
data. It's stored as a template,
and when users start opting in
and expressing preferences,
they're shown the screens based
on those privacy templates that
were defined. I might see that to
get coupons from a retailer, I only
have to provide my first name and
the type of activity I do. They may
or may not need to know where
I ran, how fast I ran or anything
like that.
Whatever the case, you are
giving end users control over
exactly what level of data
they want to share, and these
preferences are stored in the
consent manager. Our data access
manager enforces the privacy
policies. Let's say some marketing
company goes and queries
that data. Now, the data access
layer will say, "Huh. You have
an advertising campaign. Sima
didn't sign up for that." So, when
you query all the users who run,
Sima's name will not appear on
the list. She did not consent. Jim
did, so his name will appear. This
additional consent management
layer is helping control what data
is provided.

22 // JULY/AUGUST 2016 ibmsystemsmag.com

1
Compliance and
privacy laws,
particularly in the

EU

,
are becoming
more

stringent
and more

difficult
to comply with

Every decision made by the
data access layer is logged, and
a report is generated that shows
the whole audit trail of this data.
It was queried; it was approved;
it was denied; it was approved
but anonymized. In essence, what
you are doing is automatically
generating your privacy audit
trail. This is not an estimate. It's
exactly what the data is, who the
data belongs to, who is querying
it and for what purpose.
Although products that do data
access auditing are available on
the market today, they don't take
into account to whom the data
belongs or the purpose for which
it was accessed.
ISM: How are you
approaching that?
SN: Although it's possible to build
the privacy enforcement into the
application, we're also providing it at the infrastructure level.
One reason for this is to prevent
intentional or unintentional efforts
to circumvent the enforcement.
Another important reason is that it
simply isn't feasible to rewrite all
of an enterprise's applications.
ISM: Would customers know
upfront where their data
is going, what's being collected, how it's being used
and for how long?


http://youtube.com/watch?v=R5CnVNHK0rU http://www.ibmsystemsmag.com

Table of Contents for the Digital Edition of IBM Systems Magazine, Mainframe - July/August 2016

Table of Contents
Editor's Desk: Security from every angle
IBM Perspective: Creating a secure foundation for hybrid cloud
Techbits: 'W' is for 'Watson'
Partner PoV: Get everyone in your organization on board with DevOps
It Today: Use analytics to improve DevOps effectiveness
Trends: Analytics can be your best defense against corporate fraud
R&D: IBM's data privacy and consent management technology provides greater control
Case Study: Head of the Class: Pacific Life gets ahead of retirement with Mainframe Academy training program
Cover Story: Defending Digital Domains: The z Systems mainframe proves to be a formidable defense system against cyberthieves
Feature: Securable z Systems: IBM offers platform-specific security solutions to address business needs and demands
Tech Showcase: A comprehensive backup and recovery solution is needed with always-available date
Sponsored Advertising Content: HotTECH Products
Tech Corner: Overview: The latest CICS and IMS updates place z Systems at the center of the API economy
Tech Corner: IMS: IBM IMS helps support innovation to stay competitive
Tech Corner: CICS: Getting started with architecting Java Enterprise Edition in CICS Transaction Server
Solutions: SUPERMON for Tubes, zHISR 2.7
Stop Run: IBMer finds his balance with hiking and mountaineering
Reference Point - Global Events, Education, Resources for Mainframe
2016 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - July/August 2016 - Intro
IBM Systems Magazine, Mainframe - July/August 2016 - Cover1
IBM Systems Magazine, Mainframe - July/August 2016 - Cover2
IBM Systems Magazine, Mainframe - July/August 2016 - 1
IBM Systems Magazine, Mainframe - July/August 2016 - Table of Contents
IBM Systems Magazine, Mainframe - July/August 2016 - 3
IBM Systems Magazine, Mainframe - July/August 2016 - 4
IBM Systems Magazine, Mainframe - July/August 2016 - 5
IBM Systems Magazine, Mainframe - July/August 2016 - Editor's Desk: Security from every angle
IBM Systems Magazine, Mainframe - July/August 2016 - 7
IBM Systems Magazine, Mainframe - July/August 2016 - IBM Perspective: Creating a secure foundation for hybrid cloud
IBM Systems Magazine, Mainframe - July/August 2016 - 9
IBM Systems Magazine, Mainframe - July/August 2016 - Techbits: 'W' is for 'Watson'
IBM Systems Magazine, Mainframe - July/August 2016 - 11
IBM Systems Magazine, Mainframe - July/August 2016 - Partner PoV: Get everyone in your organization on board with DevOps
IBM Systems Magazine, Mainframe - July/August 2016 - 13
IBM Systems Magazine, Mainframe - July/August 2016 - It Today: Use analytics to improve DevOps effectiveness
IBM Systems Magazine, Mainframe - July/August 2016 - 15
IBM Systems Magazine, Mainframe - July/August 2016 - 16
IBM Systems Magazine, Mainframe - July/August 2016 - 17
IBM Systems Magazine, Mainframe - July/August 2016 - Trends: Analytics can be your best defense against corporate fraud
IBM Systems Magazine, Mainframe - July/August 2016 - 19
IBM Systems Magazine, Mainframe - July/August 2016 - R&D: IBM's data privacy and consent management technology provides greater control
IBM Systems Magazine, Mainframe - July/August 2016 - 21
IBM Systems Magazine, Mainframe - July/August 2016 - 22
IBM Systems Magazine, Mainframe - July/August 2016 - 23
IBM Systems Magazine, Mainframe - July/August 2016 - Case Study: Head of the Class: Pacific Life gets ahead of retirement with Mainframe Academy training program
IBM Systems Magazine, Mainframe - July/August 2016 - 25
IBM Systems Magazine, Mainframe - July/August 2016 - 26
IBM Systems Magazine, Mainframe - July/August 2016 - 27
IBM Systems Magazine, Mainframe - July/August 2016 - Cover Story: Defending Digital Domains: The z Systems mainframe proves to be a formidable defense system against cyberthieves
IBM Systems Magazine, Mainframe - July/August 2016 - 29
IBM Systems Magazine, Mainframe - July/August 2016 - 30
IBM Systems Magazine, Mainframe - July/August 2016 - 31
IBM Systems Magazine, Mainframe - July/August 2016 - 32
IBM Systems Magazine, Mainframe - July/August 2016 - 33
IBM Systems Magazine, Mainframe - July/August 2016 - Feature: Securable z Systems: IBM offers platform-specific security solutions to address business needs and demands
IBM Systems Magazine, Mainframe - July/August 2016 - 35
IBM Systems Magazine, Mainframe - July/August 2016 - 36
IBM Systems Magazine, Mainframe - July/August 2016 - 37
IBM Systems Magazine, Mainframe - July/August 2016 - 38
IBM Systems Magazine, Mainframe - July/August 2016 - Tech Showcase: A comprehensive backup and recovery solution is needed with always-available date
IBM Systems Magazine, Mainframe - July/August 2016 - 40
IBM Systems Magazine, Mainframe - July/August 2016 - 41
IBM Systems Magazine, Mainframe - July/August 2016 - 42
IBM Systems Magazine, Mainframe - July/August 2016 - 43
IBM Systems Magazine, Mainframe - July/August 2016 - Sponsored Advertising Content: HotTECH Products
IBM Systems Magazine, Mainframe - July/August 2016 - 45
IBM Systems Magazine, Mainframe - July/August 2016 - 46
IBM Systems Magazine, Mainframe - July/August 2016 - 47
IBM Systems Magazine, Mainframe - July/August 2016 - 48
IBM Systems Magazine, Mainframe - July/August 2016 - 49
IBM Systems Magazine, Mainframe - July/August 2016 - Tech Corner: Overview: The latest CICS and IMS updates place z Systems at the center of the API economy
IBM Systems Magazine, Mainframe - July/August 2016 - 51
IBM Systems Magazine, Mainframe - July/August 2016 - 52
IBM Systems Magazine, Mainframe - July/August 2016 - 53
IBM Systems Magazine, Mainframe - July/August 2016 - Tech Corner: IMS: IBM IMS helps support innovation to stay competitive
IBM Systems Magazine, Mainframe - July/August 2016 - 55
IBM Systems Magazine, Mainframe - July/August 2016 - 56
IBM Systems Magazine, Mainframe - July/August 2016 - 57
IBM Systems Magazine, Mainframe - July/August 2016 - Tech Corner: CICS: Getting started with architecting Java Enterprise Edition in CICS Transaction Server
IBM Systems Magazine, Mainframe - July/August 2016 - 59
IBM Systems Magazine, Mainframe - July/August 2016 - 60
IBM Systems Magazine, Mainframe - July/August 2016 - 61
IBM Systems Magazine, Mainframe - July/August 2016 - 62
IBM Systems Magazine, Mainframe - July/August 2016 - Solutions: SUPERMON for Tubes, zHISR 2.7
IBM Systems Magazine, Mainframe - July/August 2016 - Stop Run: IBMer finds his balance with hiking and mountaineering
IBM Systems Magazine, Mainframe - July/August 2016 - Cover3
IBM Systems Magazine, Mainframe - July/August 2016 - Cover4
IBM Systems Magazine, Mainframe - July/August 2016 - Reference Point - Global Events, Education, Resources for Mainframe
IBM Systems Magazine, Mainframe - July/August 2016 - 2016 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - July/August 2016 - SE2
IBM Systems Magazine, Mainframe - July/August 2016 - SE3
IBM Systems Magazine, Mainframe - July/August 2016 - SE4
IBM Systems Magazine, Mainframe - July/August 2016 - SE5
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/relevantz_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2019mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20181112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2018mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20171112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_sesupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_linuxsupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20161112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/MainframeSecurity
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20151112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910_se
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910
http://www.ibmsystemsmagmainframedigital.com/MFSkills
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506_supp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20141112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_gt_201405
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/BigData
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20131112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20121112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/buyersguide2013
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/ibmsystems_mainframe_2012bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20111112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20101112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910_bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20091112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090506
http://www.nxtbook.com/nxtbooks/ibmsystemsmag/mainframe_20090304
http://www.nxtbook.com/nxtbooks/mspcomm/ibmsystems_mainframe_200901
http://www.nxtbookMEDIA.com