Privacy Research    Human Resources

2013 Cyber Security Forecast

In this paper, Kroll outlines the top four cybersecurity concerns organizations that may blindside organizations in 2013.

Evaluating Privacy Impact Assessments

This article by Kush Wadhwa and Rowena Rodrigues first outlines the evaluation criteria established under the EU Privacy Impact Assessment Framework project and attempts to find the best means of extending their application to help assess PIAs, based on good practice.

The Insider Threat: Why Chinese hacking may be the least of corporate worries

In this paper, Kroll offers real life examples of breach incidents involving insider threats to businesses, identifying steps companies can take to reduce their risk.

Social Media Password Protection and Privacy—The Patchwork of State Laws and How It Affects Employer

This paper from Littler explores the history and background of social media password protection legislation, the differences between the state laws, and how those differences create challenges for employer compliance. The paper concludes by describing the terms a model statute at the federal level should include to eliminate the existing and expanding patchwork of state laws.

Study on Data Collection and Storage in the EU

The overall objective of this ENISA study is to serve as a starting point for a pan-European view on the rules relating to the collection and storage of personal data in the European Union and on their implementation in Member States legislation.

2013 Verizon Data Breach Investigation Report

The 2013 Data Breach Investigations Report analyzes more than 47,000 reported security incidents and 621 confirmed data breaches from 2012 and brings to bear the perspective of 19 global organizations on studying and combating data breaches in the modern world.

Risk at Home: Privacy and Security Risks in Telecommuting

This study by Ernst & Young and the Center for Democracy and Technology illustrates the concerns of businesses, the current state of their privacy and security practices and the weaknesses that exist that require immediate consideration. The areas covered in this report include a review of devices used by telecommuters, recommendations for securing hardware and software and technology controls and solutions to name a few.

The Right To Be Forgotten—Between Expectations and Practice

This paper complements two other recent ENISA publications in this area and focuses on the technical means to enforce or support the right to be forgotten in information systems; “there are technical limitations and there is a further need for clear definitions and legal clarifications.” In this paper ENISA reviews relevant existing technology and identifies the technical limitations and challenges to enforcement as well as the need for additional definitions and legal clarifications.

The Pursuit of Privacy in a World Where Information Control is Failing

This article by Adam Thierer and originally published in the Harvard Journal of Law and Public Policy focuses on privacy rights in relation to private enterprise and suggests that expanded regulation is not the most constructive way to ensure greater online privacy. The article introduces the notion that “Legislative and regulatory efforts aimed at protecting privacy must now be seen as an increasingly intractable information control problem.”

The economic cost of publicly announced information security breaches

This 2003 study by Katherine Campbell, Lawrence Gordon, Martin Loeb and Lei Zhou of the University of Maryland examines the economic effect of information security breaches reported in newspapers on publicly traded U.S. corporations.

Managing the Risks of Using the Internet for Employment Screening Background Checks

This whitepaper by Employment Screening Resources provides an introduction for employers and recruiters using Internet search engines and social networking sites for recruitment and employment screening background checks and the possible legal risks faced when conducting such screening, as well as potential solutions to avoid legal issues.

Privacy Risk Management: Building privacy protection into a Risk Management Framework

This paper from the Information & Privacy Commissioner of Ontario and co-authored by Dan Ruch, Monica Merrifield, Fariba Anderson and Jeff Kirke introduces the concept of Privacy Risk Management. It begins by examining characteristics indicative of an organization’s privacy and risk management maturity. Identifying the growing significance of privacy risk, it describes the manner in which Privacy by Design may be integrated within an organization’s existing risk management process.

Whitepaper series on the proposed EU Data Protection Regulation

This series of three whitepapers by the Future of Privacy Forum addresses some key components of the proposed EU data protection Regulation, namely the costs and paradoxes of explicit consent; the definition of personal data, and jurisdiction and applicable law under the EU general data protection regulation.

Privacy trends 2013: The uphill climb continues

This report by Ernst & Young details privacy’s increasing effect on businesses in the new year and highlights three primary categories that the firm predicts will shape the new privacy era: governance, technology and regulation. It also calls on organizations and regulators to work together to shape privacy within the digital landscape and to “appreciate the governance role they must play in safeguarding personal information.”

Regulating Privacy by Design

In this paper, Ira S. Rubinstein of the Information Law Institute and New York University School of Law seeks to clarify the meaning of privacy by design and thereby suggest how privacy regulators might develop appropriate incentives to offset the certain economic costs and uncertain privacy benefits of this new approach.

Page 3 of 6 pages  < 1 2 3 4 5 >  Last ›