This paper from Information and Privacy Commissioner of Ontario Ann Cavoukian co-authored with Stuart Shapiro of the MITRE Corporation and R. Jason Cronk of Enterprise Consulting Group offers an introduction as to what privacy engineering entails and looks into how a privacy engineer approaches risks and risk analysis; considers the broad classes of mitigating controls, and examines trade-offs.
This Hogan Lovells whitepaper by Christopher Wolf analyses the available data offered in service providers’ transparency reports, noting that “Law enforcement requests in the U.S. compared with reported requests of other governments do not reveal great disparity.”
The Corporate Executive Board Company created this report based on General Counsel Roundtable research that outlines concerns of legal executives in relation to corporate data management. The report looks into the costs of technology and information incidents, calculating risk and the role of legal departments in information risk.
This article by Orin Kerr in the University of Pennsylvania Law Review offers a thought experiment about what might happen if Congress were to repeal ECPA and enact a new privacy statute to replace it.
The Center for Information Policy Research and the Center for Applied Cybersecurity Research of Indiana University hosted this workshop exploring use-based risk assessments. Fred Cate and Viktor Mayer-Schönberger note in this paper highlighting the outcomes of the workshop, “Only by understanding and applying the tools of risk assessment and management to clearly articulated categories of potential harms and benefits likely to result from uses of personal data can we ensure that data are used responsibly, that individual privacy is protected, and that data users are accountable stewards of the data they possess.”
Notification, call center and identity protection products all seek to help you maintain trust while meeting complex obligations. The list below represents the variety of vendors available.
Insurance can protect you in case of a cyber attack with liability associated with the loss of customer or employee data. The list below represents the variety of
Law firms offer a wide variety of privacy services ranging from risk mitigating services such as planning and implementing privacy and security programs to responsive services such as assistance with regulatory response, investigations, remediation and litigation. The list below represents the variety of vendors available.
The privacy industry is young and fast moving. What used to be the fascination of academics has become a business pursuit. Protecting data has value and you have to invest to make sure that data is properly protected. Businesses must work with a large collection of vendors from a variety of disciplines to reach their privacy goals.
Businesses frequently rely on the experience, resources and tools that consultants offer to assist with risk assessment, compliance and data breach preparedness or response. The list below represents the variety of vendors available.
This series of four articles by Kuan Hon and Prof. Christopher Millard of Queen Mary University of London explore the challenges of cloud computing in the EU. Articles include 'Personal Data' in Cloud Computing - What Information is Regulated? The Cloud of Unknowing, Part 1; Who is Responsible for 'Personal Data' in Cloud Computing? The Cloud of Unknowing, Part 2; Data Protection Jurisdiction and Cloud Computing; When are Cloud Users and Providers Subject to EU Data Protection Law? The Cloud of Unknowing, Part 3, and Data Export in Cloud Computing; How Can Personal Data Be Transferred Outside the EEA? The Cloud of Unknowing, Part 4
In this practical whitepaper, Omer Tene and Marc Groman, CIPP/US, offer tips to help small businesses safeguard consumer data, build trust and “avoid boosting newspaper sales with sensationalist business titles.”
This study from J.D. Power and SSI looked at consumers in the United States, China and India to evaluate concerns about data privacy and its ownership. Results of this research show that consumers’ concerns about data privacy and ownership have increased across the past three decades and remain high. Moreover, results show that concern about personal privacy is an issue for consumers in all countries and across all age groups. (October 2013)
Page 1 of 8 pages 1 2 3 > Last ›