Notification, call center and identity protection products all seek to help you maintain trust while meeting complex obligations. The list below represents the variety of vendors available.
Insurance can protect you in case of a cyber attack with liability associated with the loss of customer or employee data. The list below represents the variety of
Law firms offer a wide variety of privacy services ranging from risk mitigating services such as planning and implementing privacy and security programs to responsive services such as assistance with regulatory response, investigations, remediation and litigation. The list below represents the variety of vendors available.
The privacy industry is young and fast moving. What used to be the fascination of academics has become a business pursuit. Protecting data has value and you have to invest to make sure that data is properly protected. Businesses must work with a large collection of vendors from a variety of disciplines to reach their privacy goals.
Businesses frequently rely on the experience, resources and tools that consultants offer to assist with risk assessment, compliance and data breach preparedness or response. The list below represents the variety of vendors available.
This series of four articles by Kuan Hon and Prof. Christopher Millard of Queen Mary University of London explore the challenges of cloud computing in the EU. Articles include 'Personal Data' in Cloud Computing - What Information is Regulated? The Cloud of Unknowing, Part 1; Who is Responsible for 'Personal Data' in Cloud Computing? The Cloud of Unknowing, Part 2; Data Protection Jurisdiction and Cloud Computing; When are Cloud Users and Providers Subject to EU Data Protection Law? The Cloud of Unknowing, Part 3, and Data Export in Cloud Computing; How Can Personal Data Be Transferred Outside the EEA? The Cloud of Unknowing, Part 4
In this practical whitepaper, Omer Tene and Marc Groman, CIPP/US, offer tips to help small businesses safeguard consumer data, build trust and “avoid boosting newspaper sales with sensationalist business titles.”
This study from J.D. Power and SSI looked at consumers in the United States, China and India to evaluate concerns about data privacy and its ownership. Results of this research show that consumers’ concerns about data privacy and ownership have increased across the past three decades and remain high. Moreover, results show that concern about personal privacy is an issue for consumers in all countries and across all age groups. (October 2013)
Kinsella Media with the IAPP and Rust Consulting produced this whitepaper discussing the consequences of failing to make clear and accurate privacy disclosures in the framework of today’s legal and regulatory landscape. Researchers Michelle Ghiselli and Shannon Wheatman offer insights on crafting plain-language policies.
Technological advancements leading to more online interactions and cheaper data storage have contributed to this paper by Fred Cate, Peter Cullen and Viktor Mayer-Shönberger rethinking the original OECD guidelines that formed the basis of most information protection frameworks and most privacy legislation around the world.
The Ponemon Institute's First Annual Cost of Trust Report provides the first extensive examination of how failure to control trust in the face of new and evolving threats is placing all global enterprises at risk. Based on survey participant expectations, organizations are projected to lose $35 million over the next 24 months.
This document from the European Parliament assesses the impacts of the proposed General Data Protection Regulation in terms of the effectiveness with which it is likely to attain its objectives, the efficiency with which it might do so and its consistency with other elements of European policy. It examines the likely impacts of the proposal and two alternative options on the competitiveness and innovation performance of the European data processing value network--those who control and process personal data and those who supply essential inputs or use the services provided. The assessment focuses on automated data processing and profiling; documenting and demonstrating compliance with the law, and data transfers to non-European jurisdictions. Whilst considering a variety of perspectives including big data, cloud computing and privacy-friendly technologies, it identifies a variety of impacts and areas for improvement.
The infographics included here offer visual presentations of study results, statistics and commonly talked-about privacy issues.
Page 1 of 7 pages 1 2 3 > Last ›