ACI_Q2_Ads_disaster-728x90
ACI_Q2_Ads_successful-728x90
ACI_Q2_Ads_battletested-728x90
PSR15_300x250_ad-UPDATED-6-15-FINAL

PrivacyTraining_ad300x250.Promo1-01

(Aug 25, 2015) The IAPP Privacy List recently lit up a bit when a member posed this question to the group: Should I go back to school and get a law degree if I want to succeed in this field? It was a legit question. After all, the IAPP 2015 Salary Survey found that after C-suite or VP-level positions, lead counsel had the highest median salaries among privacy pros. But getting a law degree isn’t a small feat. There’s studying for the LSATs; praying to some God you get in; three years of nail-biting through papers and exams, and then, and THEN, the bar. Oh, and thousands of dollars of debt, save for the independently wealthy. So is all that worth it? Will it mean a straight line to success in the privacy profession? Read More

The Privacy Advisor

Taking Stock of Marketers’ Digital Privacy Challenges

(Aug 25, 2015) The data-driven economy is rapidly shifting how marketers engage consumers and how the ecosystem brokers the issue of trust. While the digital revolution has changed the volume, variety and velocity of data that marketers can collect, analyze and make useful at relatively low cost, the rapid pace of innovation is significantly outpacing consumers' ability to keep up with how data about them is collected and used. And, Alex Krylov writes, "The uncomfortable truth is that consumers’ expectations of privacy, as well as our legal and ethical frameworks, are disconnected from our shared digital reality." Read More

The Privacy Advisor

What If You Had An Employee Data Breach?

(Aug 25, 2015) While more organizations than ever now have a data breach incident response plan in place, companies should think critically about whether they’ve accounted for different types of data loss, including both customer information and employee records. After all, an employee data breach carries legal risk similar to the breach of customer data, writes Michael Bruemmer, CIPP/US. Read More

The Privacy Advisor

Meet Hong Kong’s New DPA

(Aug 25, 2015) Earlier this month, Stephen Wong assumed the post of Hong Kong’s Privacy Commissioner for Personal Data (PCPD) for the next five years. Wong is no stranger to pressure-packed offices. He worked for 10 years in the public prosecutor’s office early in his career, tackling murder cases and high-level white-collar crime, before moving into human rights law and helping to pass the 1991 Hong Kong Bill of Rights Ordinance. Most recently, he has been working in private practice and with the Law Reform Commission of Hong Kong, which has prepared him well for the his work as PCPD. Read More

The Privacy Advisor

How To Secure Text Messages in the Electronic Healthcare Environment

(Aug 25, 2015) Texting is how many of us communicate most of the time these days. Given the convenience in communication texting provides, it's hardly surprising it's attracted members of the medical community. Physicians and healthcare staff use text messaging to facilitate communications concerning patient care. And while text messaging has significant benefits, many healthcare providers do not recognize the privacy, security and malpractice risks posed by text messaging. But these risks can be mitigated, write Avani Desai, CIPP/US, and Rebecca Schwayri. Read More

The Privacy Advisor

Could Drone Regulation Find Solutions in LED License Plates?

(Aug 25, 2015) Less than two weeks after the first FAA-approved drone delivery, government, academic and industry leaders gathered at the NASA Ames Research Center to discuss an impending future when Unmanned Aerial Systems (UAS) become commonplace in our daily lives. The 2015 UAS Traffic Management Conference centered on NASA’s role in engineering a central, federal system capable of coordinating FAA-permitted drone delivery missions while safely avoiding manned traffic. Later this month, 12 companies are taking part in NASA’s Build 1 test of the UAS Traffic Management System after over 125 corporate applications, making the present time a critical junction for privacy professionals to join the discussion as best practices are created for standard operations. Daniel Healow, CIPP/US, was at the conference and reports on the details. Read More

The Privacy Advisor

Monitoring Your Privacy Program: Part Five

(Aug 25, 2015) This series on monitoring has focused on best practices and recommendations from industry leaders on how to best monitor your privacy program. Organizations across industries face the challenge of determining what to monitor, how to monitor it and how to share the results of that monitoring to tell a story about compliance.This chapter focuses on the telecom industry and draws advice from Maureen Cooney, CIPP/US, CIPP/G, head of privacy at Sprint Corporation. Read More

The Privacy Advisor