The infographics included here offer visual presentations of study results, statistics and commonly talked-about privacy issues.
This report from Edelman outlines the findings of a study analyzing theleading factors of privacy risk and how 6,400 privacy and security executives in 29 countries and regions across 20 industries manage these issues. The study was conducted using Edelman PrivacyRisk Index, developed in partnership with the Ponemon Institute.
This paper from the Future of Privacy Forum examines the appropriate privacy paradigm for the world of the Internet of Things. The paper was authored by Christopher Wolf and Jules Polonetsky co-chairs of the Future of Privacy Forum and released in conjunction with the November 2013 FTC workshop on the Internet of Things.
In the wake of the disclosures surrounding PRISM and other U.S. surveillance programs, this study makes an assessment of the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands.
This report from Liana Yung and David Zetoony of Bryan Cave LLP analyzes class-action complaints filed against private entities between January and June of 2013 to help companies better understand the scope, and frequency, of data-related litigation.
This survey by the Pew Research Center’s Internet Project asked 1,002 adults about their Internet habits. It is laid out in five parts: the quest for anonymity online; concerns about personal information online; who internet users are trying to avoid, the information they want to protect; how users feel about the sensitivity of certain kinds of data; online identity theft, security issues and reputational damage. (2013)
Created by the Consumer Federation of America (CFA), this paper analyzes how well identity theft services are providing key information to prospective customers. The study is based on CFA’s Best Practices for Identity Theft Services, voluntary guidelines that CFA developed with the help of identity theft service providers and consumer advocates.
This paper by Girard Kelly of Santa Clara University School of Law examines the European Commission’s recently proposed data protection reform of the 1995 EU Data Protection Regulation and the U.S Consumer Privacy Bill of Rights. The paper will elucidate the data protection framework expressed in the Regulation’s principles, within the context of their implications on the proposed policies of the U.S Consumer Privacy Bill of Rights. This analysis will explore the public policy and regulatory frameworks of both data protection perspectives and recommend legal harmonization between the U.S and the EU’s data protection principles by providing legislative guidance to policymakers.
This report gives a brief overview of the FTC’s role in the enforcement and the interpretation of FCRA, followed by an FTC Staff Summary of Interpretations of the FCRA in a section-by-section format. It was created in 2011 to assist the CFPB as it took on many of the interpretive functions of FCRA.
This web page shows data breach incidents by incident type and sector for the year beginning April 1 to track trends.The UK Information Commissioner’s Office will update the data quarterly.
In this paper, Kroll outlines the top four cybersecurity concerns organizations that may blindside organizations in 2013.
This article by Kush Wadhwa and Rowena Rodrigues first outlines the evaluation criteria established under the EU Privacy Impact Assessment Framework project and attempts to find the best means of extending their application to help assess PIAs, based on good practice.
In this paper, Kroll offers real life examples of breach incidents involving insider threats to businesses, identifying steps companies can take to reduce their risk.
This paper from Littler explores the history and background of social media password protection legislation, the differences between the state laws, and how those differences create challenges for employer compliance. The paper concludes by describing the terms a model statute at the federal level should include to eliminate the existing and expanding patchwork of state laws.
The overall objective of this ENISA study is to serve as a starting point for a pan-European view on the rules relating to the collection and storage of personal data in the European Union and on their implementation in Member States legislation.
Page 2 of 6 pages < 1 2 3 4 > Last ›