Salinger Privacy published an overview of the protocols companies should follow when considering participation in a data "hackathon” to solve privacy issues. In such a hackathon, or “datathon,” data scientists and other employees use data from sponsors or public entities “to quickly generate insights and build potential solutions” for a specific problem. Organizations offering data sets for hackathons should consider whether use of the data is allowable in the first place, other obligations for the collection and storage of the data set, whether deidentified data can still be considered personal information under the applicable law and what data security measures are needed.
Overview of data protection protocols for hackathons published
Related stories
Notes from the Asia-Pacific region: OPC's final guidance on Privacy Act amendment supports practical, pragmatic approach
EU Data Act operational impacts: Compliance and technical considerations of cloud switching
A view from Brussels: Reading Nobel Prize recipient Albert Camus
From CIPP to career: Mapping the next chapter of privacy work
CalPrivacy staff offers first look at DROP system
