BigID_ldbd_ROS_GDPR_red
OneTrust - Leaderboard Banner - Data Mapping_ROS_041417
MediaPro_Ldbd_iapp-gdpr-aligned-training-250x300-ad1-opt (3)041317
PrivacyTraining_ad300x250.Promo1-01
APF17_WebBanner_300x250-COPY
PrivacyCore_ad_300x250-01

(Apr 18, 2017) As with so many things in this world, there is rarely, if ever, a silver-bullet solution to a complex problem in privacy. Perhaps the most glaring example of this is in defining the identifiability of an individual.  Countless privacy laws and regulations around the world define personal information or personally identifiable information in different ways, using varying definitions and key terms. One jurisdiction may consider an IP address PII while another may not. The Federal Trade Commission... Read More

Privacy Tech

On simplifying data breach notification compliance

(Apr 7, 2017) Keeping track of the variety of data breach notification laws is easier said than done. All over the world, organizations need to be aware of notification laws that differ by state, country and continent. The first task an organization should do to simplify the compliance process is to create a response team to resolve incidents quickly and ensure all breach incidents are properly documented. With states having various timelines for notification and different rules, response teams cannot simply... Read More

Privacy Tech

'Design Jam’ provides new approach to data transparency and control

(Mar 28, 2017) Earlier this month in Berlin, Germany, organizations including service innovation consultancy Work Play Experience, business consultancy Ctrl-Shift, the University of Southampton, and Facebook piloted a unique workshop — called a Design Jam — dedicated to re-inventing the way we help people understand and manage how their data is used. Our goal: use design thinking — the methods used by designers to make technology usable and our lives simpler — to give people better visibility and control over ... Read More

Privacy Tech

FBI facial recognition in spotlight at House Oversight hearing

(Mar 22, 2017) Representatives from several government agencies, along with members of industry and civil society, appeared Wednesday before the U.S. House Oversight Committee to explore privacy issues around the use of facial recognition technology, including the potential need for drafting legislation to limit some of its use. Much of the focus during the two-hour hearing centered on a Government Accountability Office report from May 2016 that was critical of the Federal Bureau of Investigation's use of the ... Read More

Privacy Tech

BeLoanReady mortgage app puts user privacy ahead of sales

(Mar 17, 2017) The founders of Arrive Home Mortgage have always been looking for ways to transform the mortgage industry. Throughout many conversations, they found the best way to accomplish this was to always keep the consumers' best interest in mind. While looking into their competition, the Arrive Home Mortgage team saw some unsettling trends in ways online mortgage companies were delivering information to consumers. "We started looking at those options and one of the big takeaways we had very early was i... Read More

Privacy Tech

New website scanning, cookie compliance tool for IAPP members

(Mar 14, 2017) In a continued build-out of the IAPP-OneTrust platform of privacy tools, we are releasing today the new IAPP-OneTrust Website Scanning and Cookie Compliance Tool. It is freely available for IAPP members and is as of today available in the sidebar and on the welcome screen if you’re already a user of the IAPP-OneTrust platform, alongside the GDPR/data transfer readiness assessment tool and the PIA automation tool. People attending the sold-out Data Protection Intensive in London this week will b... Read More

Privacy Tech

Tech sector, enterprises respond to CIA-hacking leaks

(Mar 9, 2017) As the dust begins to settle following Tuesday's Wikileaks data dump of the U.S. Central Intelligence Agency hacking methods, the technology sector is scrambling to patch security fixes and warn users to update their software. The 9,000 pages of documents released by Wikileaks, which security professionals believe are legitimate, reveal methods the CIA has developed to circumvent the hardware and software of some of the world's top technology products, including exploiting smartphone operating s... Read More

Privacy Tech

Enterprise communications and the power of data humiliation

(Mar 7, 2017) Russian hackers are reportedly blackmailing U.S.-based progressive groups by breaking into their networks and scouring internal emails. This is how it reportedly works: The adversary gets sensitive information — say a strategic email conversation, or messages that could embarrass an executive or the organization — and demands a ransom with threats of public exposure.  This isn't the first time we've seen this, and such exposure can be terribly disruptive — heck, it may have played a role in the... Read More

Privacy Tech

Design Jam to focus on privacy solutions

(Mar 6, 2017) “Privacy by design” has come to mean a lot of things. For many, it has boiled down to simply thinking about privacy and data protection from the outset of a project and all the way through to completion. It’s getting privacy in at the “whiteboard stage.” Lost, perhaps, in that way of thinking, however, is the “design” piece. How do organizations literally design and engineer their products and services to emphasize privacy and bring user control over their data to the fore? That’s the question... Read More

Privacy Tech

This app uses machine learning to help users find the best privacy settings

(Mar 3, 2017) Chances are, if you have a smartphone, you likely have a wide variety of apps filling up your screen. You likely have apps for your social media accounts, your bank, and maybe a GPS app to help you find the closest restaurant. While everyone may be flocking to Facebook, Google Maps, and PayPal, users' views about their app settings and permissions will probably differ. This was the impetus behind the creation of the Privacy Assistant app, a tool created by Carnegie Mellon University researcher... Read More

Privacy Tech