This report from Edelman outlines the findings of a study analyzing theleading factors of privacy risk and how 6,400 privacy and security executives in 29 countries and regions across 20 industries manage these issues. The study was conducted using Edelman PrivacyRisk Index, developed in partnership with the Ponemon Institute.
This paper from the Future of Privacy Forum examines the appropriate privacy paradigm for the world of the Internet of Things. The paper was authored by Christopher Wolf and Jules Polonetsky co-chairs of the Future of Privacy Forum and released in conjunction with the November 2013 FTC workshop on the Internet of Things.
In the wake of the disclosures surrounding PRISM and other U.S. surveillance programs, this study makes an assessment of the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands.
This report from Liana Yung and David Zetoony of Bryan Cave LLP analyzes class-action complaints filed against private entities between January and June of 2013 to help companies better understand the scope, and frequency, of data-related litigation.
This survey by the Pew Research Center’s Internet Project asked 1,002 adults about their Internet habits. It is laid out in five parts: the quest for anonymity online; concerns about personal information online; who internet users are trying to avoid, the information they want to protect; how users feel about the sensitivity of certain kinds of data; online identity theft, security issues and reputational damage. (2013)
This infographic stemming from the TRUSTe U.S. 2013 Consumer Data Privacy Study—Mobile Edition, highlights some of the study’s findings related to how consumers about their mobile behaviors.
This study from TRUSTe provides a comprehensive analysis of current consumer thoughts about mobile privacy across the US. The extensive study was conducted by Harris Interactive on behalf of TRUSTe with more than 700 US smartphone users from June 12 – 19, 2013. (See also the TRUSTe Privacy Index Infographic.)
Created by the Consumer Federation of America (CFA), this paper analyzes how well identity theft services are providing key information to prospective customers. The study is based on CFA’s Best Practices for Identity Theft Services, voluntary guidelines that CFA developed with the help of identity theft service providers and consumer advocates.
This paper by Girard Kelly of Santa Clara University School of Law examines the European Commission’s recently proposed data protection reform of the 1995 EU Data Protection Regulation and the U.S Consumer Privacy Bill of Rights. The paper will elucidate the data protection framework expressed in the Regulation’s principles, within the context of their implications on the proposed policies of the U.S Consumer Privacy Bill of Rights. This analysis will explore the public policy and regulatory frameworks of both data protection perspectives and recommend legal harmonization between the U.S and the EU’s data protection principles by providing legislative guidance to policymakers.
This web page shows data breach incidents by incident type and sector for the year beginning April 1 to track trends.The UK Information Commissioner’s Office will update the data quarterly.
In this paper, Kroll outlines the top four cybersecurity concerns organizations that may blindside organizations in 2013.
This article by Kush Wadhwa and Rowena Rodrigues first outlines the evaluation criteria established under the EU Privacy Impact Assessment Framework project and attempts to find the best means of extending their application to help assess PIAs, based on good practice.
In this paper, Kroll offers real life examples of breach incidents involving insider threats to businesses, identifying steps companies can take to reduce their risk.
This article by Meg Leta Ambrose in the Stanford Technology Law Review
explores the idea of data permanence online and the right to be forgotten, while considering the changing nature of information over time. “Understanding how information changes over time in relation to its subject, how and where personal information resides online longer than deemed appropriate and what information is important for preservation allows regulation to be tailored to the problem, correctly framed,” Ambrose writes.
The overall objective of this ENISA study is to serve as a starting point for a pan-European view on the rules relating to the collection and storage of personal data in the European Union and on their implementation in Member States legislation.
Page 2 of 7 pages < 1 2 3 4 > Last ›