NTIA Continues To Tackle the Future of Facial Recognition

March 26, 2014
Facial recognition technology, whether you’re a friend or foe, has a robust future, something clearly on display during the National Telecommunications & Information Administration’s (NTIA) March 25 multi-stakeholder meeting on creating a code of conduct for the technology. With the NTIA still in the gathering and learning stage, the meeting featured presentations from technology experts, some industry representatives and the Federal Trade Commission.

Summer Privacy Institute Will Bring Invaluable Education to Lawyers, Managers, Privacy Pros

March 25, 2014
As the most recent iteration of the IAPP's Global Privacy Professionals Salary Survey results revealed, in the privacy field it is those with law degrees who report earning the highest salaries and those with a Certified Information Privacy Professional (CIPP) designation reported salary levels outpacing even those with Master of Business Administration degrees. Enter this year’s IAPP Information Privacy Summer Institute, providing privacy education from leading privacy scholars and an opportunity for law school or professional development credit.

Attacking Data Leakage

March 25, 2014
“Publishers don’t really have their arms around their audiences in the way they used to,” said Joe Titlebaum. “The people who understand audiences the best are the ad tech folks.” Many publishers are uncomfortable with that, which presents a market opportunity. Titlebaum is chief legal and privacy officer for Mezzobit, a New York City-based start-up that’s focused on helping online publishers both understand their audience and prevent data leakage that might present privacy issues or simply make their readers uncomfortable.

Why Isn’t Peter Hustinx on a Beach in New Zealand by Now?

March 25, 2014
In January, European Data Protection Supervisor (EDPS) Peter Hustinx and his staff celebrated the EDPS’ 10th year as an institution. Hustinx had all but blown out the candles on his proverbial “Bon Voyage” cake when the European Commission said, “Not so fast.” Though his two-term run had expired, the commission deemed the five candidates it interviewed to replace him late last year “inadequate.” Hustinx, Slovenia Information Commissioner Natasa Pirc Musar and Covington & Burling’s Henriette Tielemans weigh in on the delay in filling this crucial role.

Designing and Implementing an Effective Privacy and Security Plan

March 24, 2014
In its 2013 global data breach study, the Ponemon Institute reported that data breaches experienced by U.S. companies continue to be the second most expensive in the world at $188 per record. The study also reported that U.S. companies had the second greatest number of exposed or compromised records per breach at 28,765, resulting in an average total organizational cost of more than $5.4 million per data breach. Your company can mitigate the high costs of remediating a data breach by having a strong security posture and incident response plan, assembling a proper team to oversee your privacy and security practices and having a plan for breach remediation, writes Ronald Breaux.

Think Outside the Box; the Crooks Always Do

March 24, 2014
For consumers, identity theft seems to be the number-one concern, according to the FTC and a recent Ponemon survey. As privacy pros, putting ourselves in the customer’s shoes can foster perspectives that should lead to making the right decisions as risk managers, writes Matt Storer. Here are some scenarios to consider.

Are Doorstep Drone Deliveries Just Around the Corner?

March 24, 2014
Until recently, there was little concern that commercial drone technology might outrun the legal framework for dealing with it. The Federal Aviation Administration (FAA) has rarely issued certifications for commercial drones. But the FAA now has a mandate to open the national airspace to drones. And in a sign that the future may arrive sooner than expected, last month an administrative law judge reversed the FAA’s imposition of a $10,000 fine against an aerial videographer for using a drone to shoot a promotional video, saying the FAA had exceeded its authority under existing rules. In part two of this three-part series, Michael Whitener, CIPP/US, CIPP/C, CIPP/E, CIPP/G, CIPP/IT, CIPM, zooms in on what the future may hold. Missed part one of this series? See it here.

Europe Seeks To Rise Up and Compete on Cloud Computing

March 24, 2014
Several recent activities have converged with longer-standing efforts to push cloud computing forward in Europe. Swirling around these activities have been violations of European government and citizens’ privacy via the U.S. PRISM program, lingering doubts about the effectiveness of the EU-U.S. Safe Harbor Agreement and the steady drumbeat of headline-grabbing data breaches undermining confidence in the cloud. Thomas Shaw, CIPP/US, looks at Europe’s plan to become a leading jurisdiction in cloud computing.

FTC: Undeterred by Challenges to Its Authority

March 24, 2014
Over the past few years, the Federal Trade Commission (FTC) has become increasingly active in investigating and enforcing violations of federal statutes governing privacy and data security and has also recently focused its attention on other privacy issues—including data brokers, the Internet of Things, Big Data, the U.S.-EU Safe Harbor Framework and deceptive privacy policies. Corey M. Dennis, CIPP/US, takes a close look at key FTC cases and their practical implications.

Good Cybersecurity Means Good Info Governance

March 24, 2014
While cybersecurity sounds like a highly specialized knowledge area, much of the work necessary to protect business data does not fall within the purview of the technical cyber specialists. The foundation of any good information security program is good information governance. In short, before you secure your data, you have to know your data. You have to know what data you have, where you have it, why you have it and how you use it. This may seem like a seductively simple task, but often it is not, writes Brian Boyd, CIPP/US.

Why Is the U.S. on the Defensive?

March 24, 2014
NSA surveillance may greatly exceed that of any other free-world intelligence agency, and the NSA allegedly has diminished security by covertly inducing the use of “back doors” in communications products and systems. But those who say the EU trumps the U.S. on privacy protections may be overlooking a few inconvenient points, writes David Bender.

Privacy Act Officers Should Also Be Well-Versed in FOIA

March 24, 2014
Privacy Act (PA) requesters typically are not aware of how their request may unfold regarding the information they are requesting. Oftentimes, they don’t know or understand how their requests can easily transition into a Freedom of Information Act (FOIA) request. As such, experienced PA officers should not only have a depth of experience in the PA program but also a breadth of experience and understanding of the FOIA framework in order to facilitate quality customer service, writes Office of Natural Resources Revenue FOIA and PA Officer Richard Lopez, Jr.

Ten Steps to a Quality Privacy Program, Part Eight: Apply Lessons Learned from Others’ Mistakes

March 24, 2014
In part eight of the series "Ten Steps to a Quality Privacy Program," Deidre Rodriguez, CIPP/US, discusses the importance of learning from others’ mistakes. “Regulators take a hard line on mistakes that have been in the press and that are then repeated by others. Look for headlines in which fines and penalties, large breaches or other privacy- or security-related issues are discussed,” writes Rodriguez.

Are You Ready for Express-Consent CASL? ‘Cause It’s Coming

March 21, 2014
Though the government has promised to help coach proactively through the transition, organizations would be wise to start taking steps toward compliance with Canada’s anti-spam legislation (CASL), which becomes effective July 1. CASL will affect any individual, business or organization that uses commercial electronic messages (CEMs) or transmits data in electronic messages. In short, it requires senders to obtain express consent for commercial electronic messages. Angelique Carson, CIPP/US, examines the law’s provisions with insights from industry and privacy experts.

Lookout Releases Free, Open-Source Short Form Privacy Policy

March 14, 2014
You know the privacy policy story by now: While ostensibly intended to inform users of what a company will do with their personal data, the egregiously long, riddled-in-legalese documents have evolved into a formality rather than a meaningful contract for users themselves. That’s why Lookout has just released an open-source tool that aims to revolutionize that. “Private Parts” allows app developers to customize short-form privacy policies for their brands or products in five steps, or under an hour. Angelique Carson, CIPP/US, has the story.

Page 2 of 45 pages  < 1 2 3 4 >  Last ›