BigID_ldbd_ROS_Redefining
BNA_21569 BLW ACC 2016 AHLA Survey and Guidance Report BAN 728x90_Ldbd
MediaPro_Ldbd_ROS_iapp-executive-summary-ad-cta-1-728x90-opt
ONETrust_Webcon-3_23_17_Ad_300x250_OneTrust_v2
S17_Banner_300x250-COPY
CS17_Banner_300x250-COPY

(Mar 22, 2017) Representatives from several government agencies, along with members of industry and civil society, appeared Wednesday before the U.S. House Oversight Committee to explore privacy issues around the use of facial recognition technology, including the potential need for drafting legislation to limit some of its use. Much of the focus during the two-hour hearing centered on a Government Accountability Office report from May 2016 that was critical of the Federal Bureau of Investigation's use of the ... Read More

Privacy Tech

BeLoanReady mortgage app puts user privacy ahead of sales

(Mar 17, 2017) The founders of Arrive Home Mortgage have always been looking for ways to transform the mortgage industry. Throughout many conversations, they found the best way to accomplish this was to always keep the consumers' best interest in mind. While looking into their competition, the Arrive Home Mortgage team saw some unsettling trends in ways online mortgage companies were delivering information to consumers. "We started looking at those options and one of the big takeaways we had very early was i... Read More

Privacy Tech

New website scanning, cookie compliance tool for IAPP members

(Mar 14, 2017) In a continued build-out of the IAPP-OneTrust platform of privacy tools, we are releasing today the new IAPP-OneTrust Website Scanning and Cookie Compliance Tool. It is freely available for IAPP members and is as of today available in the sidebar and on the welcome screen if you’re already a user of the IAPP-OneTrust platform, alongside the GDPR/data transfer readiness assessment tool and the PIA automation tool. People attending the sold-out Data Protection Intensive in London this week will b... Read More

Privacy Tech

Tech sector, enterprises respond to CIA-hacking leaks

(Mar 9, 2017) As the dust begins to settle following Tuesday's Wikileaks data dump of the U.S. Central Intelligence Agency hacking methods, the technology sector is scrambling to patch security fixes and warn users to update their software. The 9,000 pages of documents released by Wikileaks, which security professionals believe are legitimate, reveal methods the CIA has developed to circumvent the hardware and software of some of the world's top technology products, including exploiting smartphone operating s... Read More

Privacy Tech

Enterprise communications and the power of data humiliation

(Mar 7, 2017) Russian hackers are reportedly blackmailing U.S.-based progressive groups by breaking into their networks and scouring internal emails. This is how it reportedly works: The adversary gets sensitive information — say a strategic email conversation, or messages that could embarrass an executive or the organization — and demands a ransom with threats of public exposure.  This isn't the first time we've seen this, and such exposure can be terribly disruptive — heck, it may have played a role in the... Read More

Privacy Tech

Design Jam to focus on privacy solutions

(Mar 6, 2017) “Privacy by design” has come to mean a lot of things. For many, it has boiled down to simply thinking about privacy and data protection from the outset of a project and all the way through to completion. It’s getting privacy in at the “whiteboard stage.” Lost, perhaps, in that way of thinking, however, is the “design” piece. How do organizations literally design and engineer their products and services to emphasize privacy and bring user control over their data to the fore? That’s the question... Read More

Privacy Tech

This app uses machine learning to help users find the best privacy settings

(Mar 3, 2017) Chances are, if you have a smartphone, you likely have a wide variety of apps filling up your screen. You likely have apps for your social media accounts, your bank, and maybe a GPS app to help you find the closest restaurant. While everyone may be flocking to Facebook, Google Maps, and PayPal, users' views about their app settings and permissions will probably differ. This was the impetus behind the creation of the Privacy Assistant app, a tool created by Carnegie Mellon University researcher... Read More

Privacy Tech

Tech trends: When IoT devices make headlines

(Feb 24, 2017) We all know smart devices are becoming more and more popular, so much so that people cannot stop gushing about them. They are making their way to executive condos in Singapore and are dominating tech conferences, such as CES 2017. But if you are embedded in the privacy and security industries, you are well aware of the potential privacy and security risks smart devices possess, like headline-grabbing ransomware attacks on smart homes and cars. However, a recent string of incidents proves you ca... Read More

Privacy Tech

New risk management tool offers automation of a lengthy process

(Feb 17, 2017) Rebecca Herold, CIPM, CIPP/US, CIPT, FIP, estimates she has done hundreds of security risk assessments since she took them on as part of her career path. While performing the risk assessments, even developing her own methodology to help produce them faster, Herold began to notice patterns emerging. “When they have the same types of risk, you can give the same types, or similar types, of recommendations with just a little bit of customization needed,” said Herold. “At one point I was doing 20 co... Read More

Privacy Tech

Maximizing data value while complying with GDPR may not be impossible

(Feb 2, 2017) Even though the General Data Protection Regulation will not be implemented until May 2018, businesses still have a lot to do before it comes into effect. A key question is whether it's possible for businesses to simultaneously comply with the regulation while ensuring they are maximizing the value of the data they have collected. "What’s been realized is this convenience of data processing came with a cost of the fundamental rights of data subjects. If viewed in the right light, the GDPR provid... Read More

Privacy Tech