NETWORK LOCALLY. THINK GLOBALLY.

Upcoming KnowledgeNets

 Mark Your Calendar:

 

  • Minneapolis
  • Ottawa

The International Association of Privacy Professionals

The world’s largest information privacy community. Read on or Learn More

Court Rules Safari Users Can Sue Google

(Mar 27, 2015) In what some are calling a landmark decision, the UK Court of Appeals has ruled that a group of claimants have the right to sue Google for bypassing the privacy settings on the Safari browser to install cookies to track clicks online, BBC News reports. Google said it is “disappointed with the court’s decision,” while one of the claimants described it as a “David and Goliath victory.” In its judgement, the UK court said, “These claims raise serious issues which merit a trial.” According to the re... Read More

Monitoring Third-Party Vendors Means Managing Your Own Risk: Chapter Seven

(Mar 24, 2015) In chapter seven of this ongoing series, K Royal, CIPP/E, CIPP/US discusses the stage in the third-party vendor process in which the chosen vendor has been contracted and the spend has been made. That’s not where diligence ends, however. Now it’s time to make some management decisions, like the timing and frequency, scope and level of monitoring, and who’ll be responsible for that. Read More

Videre's Oren Yakobovich on Empowering People With Surveillance

Videre founder Oren Yakobovich is a former Israeli soldier who decided, upon service, that he was more interested in "breaking the traditional power structures between citizens and government" by empowering oppressed people through the use of video documentation. By quite literally watching the watchers, civil rights abuses have been documented and change has been enacted. He used his keynote address at the IAPP Global Privacy Summit to talk about his efforts and explore the ways in which surveillance can be a force for good. 

Oregon AG Seeks Tougher State Breach Law

(Mar 24, 2015) Oregon Attorney General Ellen Rosenblum wants her state’s data breach notification law strengthened. She says that since the law was written in 2007, there’s been a dramatic increase in the retention of biometric information, which “presents a particularly serious kind of breach.” Back then, you only needed your fingerprint scanned for jobs such as working at the Pentagon. Now, we use the same scans to unlock our phones. Divonne Smoyer, CIPP/US, and Christine Czuprynski talk to Rosenblum about her efforts. Read More

A Privacy Engineer’s Analysis of Bitcoin

(Mar 26, 2015) If you’re not familiar with Bitcoin, then you should probably at least review this quick video intro before proceeding. Simply put, Bitcoin is a peer-to-peer protocol that allows for the maintenance of a transaction ledger using a consensus algorithm designed to ensure ledger integrity. Too much of a mouthful? How about Bitcoin is an Internet-based currency with cash-like qualities? At least that is how it was introduced when it was launched into the world in 2009 by its pseudonymous creator.... Read More

The Future of Tech and Democracy, and How Privacy Pros Can Help

(Mar 26, 2015) Last month in San Francisco, tech leaders and CEOs met with federal regulators to do something rather unexpected: facilitate the use of new technology in the democratic process. Along the way, participants gave serious thought on how to build safeguards to ensure the protection of consumer privacy. Inspiration for the event came from conversations Federal Elections Commission (FEC) Chair Ann Ravel, in which she shared with me her fervent belief that new technology has the potential to bring mor... Read More

The FCC's New Rule Means Changes ... But For Whom?

(Mar 24, 2015) This week, Alamo Broadband and USTelecom each sued to block the Federal Communications Commission from enforcing its February order reclassifying broadband providers as “common carriers," or a public utility of sorts, and therefore subject to the same rules that regulate telecommunications companies. The suits exemplify a panicked stakeholder reaction to a potentially disruptive change: Some personal data Internet service providers currently use to generate revenue is now considered Consumer Pro... Read More

With the Internet of Things in Full Force, Will Congress Act?

(Mar 24, 2015) Several witnesses appeared before the House Energy and Commerce subcommittee on Tuesday to testify about the rapidly growing Internet-of-Things (IoT) ecosystem. With approximately 25 billion connected devices in existence, and counting, the economic benefits and job opportunities in IoT appears to be eclipsing any significant Congressional motivation to regulate this landscape. In fact, the hearing followed an IoT showcase hosted by the subcommittee to demonstrate many of the technological inno... Read More

Commission Says It Cannot Guarantee EU Privacy in U.S. Data Transfers

(Mar 25, 2015) In a hearing on Tuesday at the European Court of Justice (ECJ), counsel for the European Commission conceded that the U.S. was under no legal obligation to comply with EU data protection standards, specifically under the EU-U.S. Safe Harbor Agreement, The Irish Times reports. European Commission Counsel Bernhard Schima said, “Under Safe Harbour as it is currently applied in the U.S., there is no guarantee that fundamental rights of EU data subjects will be respected.” The verdict on the case cou... Read More

IAPP Canada Privacy Symposium 2015

The premier event in Canadian privacy will return to Toronto, but don’t expect the same old same old—think even bigger and better than the last. Canadian privacy pros, this is your must-attend event of the year. Read More

ECJ Hears Safe Harbor Arguments

(Mar 24, 2015) The European Court of Justice has heard arguments in a case originally brought by Austrian law student Max Schrems that was referred up the line to the EU's highest adjudicators. At issue is this: Does the Safe Harbor program adequately protect the rights of EU citizens when "compliant" companies are known to share EU citizen data with U.S. intelligence bodies? Read More

Lewis to IAPP: Privacy Breeds Innovation

(Mar 24, 2015) How often have we heard that “privacy” has the potential to stand in the way of innovation in the Digital Age? Well, Sarah Lewis is here to tell you that’s hogwash. Author of The Rise: Creativity, the Gift of Failure, and the Search for Mastery, Lewis argues that innovation is impossible without privacy, that inventors and thinkers need private spaces in which to fail in order to truly succeed in the public arena. See her full keynote address to the IAPP Global Privacy Summit to understand the h... Read More

The Future of Privacy: My Journey Down the Rabbit Hole at SXSW

(Mar 20, 2015) For a first-timer, SXSW is one overwhelming experience. I’d imagine it’s still overwhelming the second, or even the third, time, too. With thousands of attendees—from advertisers and entrepreneurs to musicians, filmmakers and movie stars—spread out over most of downtown Austin, TX, the vibe is palpable, and the means for distraction ubiquitous. Not only are the streets filled with flash-mob marketers and street-side musicians, the array of SXSW Interactive sessions is astounding. I quickly real... Read More

FOIA versus the Privacy Act: A Comparison and Analysis

(Mar 24, 2015) At first glance, the Freedom of Information Act and the Privacy Act may seem to achieve similar goals; however “there are, in fact, distinct and important differences in their objectives” and also “in the application of the laws and the ways the government responds to access requests,” writes Todd Walls, CIPP/G, CIPM, for Privacy Tracker. Walls offers an analysis of the two laws, including tips on responding to requests as well as an accompanying comparison chart in the IAPP Resource Center. Read More

IAPP Asia Privacy Forum 2015

Don’t miss out on the only conference that brings globally recognized IAPP programming to Asia. If you’re looking for exclusive networking and intensive education on data protection trends and challenges in Asia, the Forum is for you. Register now to save your seat. Read More

Benchmarking Privacy Management and Investments of the Fortune 1000

Over the summer of 2014, the IAPP embarked on the first of what will be an annual effort to research and benchmark the privacy programs of the Fortune 1000. In partnership with third-party research firm Fondulas Strategic Research, we queried roughly 275 privacy leads at Fortune 1000 companies, all of them large, private, for-profit firms operating from a base in the United States, and got a 23-percent response rate, providing us with one of the most comprehensive samples of corporate privacy le... Read More

Avepoint Privacy Impact Assessment System (APIA)

APIA can help you automate the process of evaluating, assessing and reporting on the privacy implications of your enterprise IT systems. Exclusively available through the IAPP, the APIA System allows you to select questions from the prepopulated bank of PIA questions or create your own, meaning you can build and save PIA templates to be reused and reported out. Learn More

Become a member

IAPP members get access to tons of great benefits

Learn More

News

Find out what’s making headlines today. In the rapid changes in data protection, we make it easy to stay in the know with daily news updates, expert analysis, original reporting, legislative alerts and opinion pieces from the influencers making the news.Find out more

Connect

There are lots of ways to connect with fellow members and the privacy community. From local chapter meetings to virtual networks to social media, you’ll find networking opportunities to help you get involved.Find out more

Learn

From privacy training to web conferences to books and beyond, you’ll find the resources you need to build your knowledge, power up your staff and be more effective at your job.Find out more

Certification

Looking for a way to stand out? Add an IAPP credential after your name. Whether you want to distinguish yourself from others in your field or to advance your skills, a globally recognized IAPP certification is the edge you’re looking for.Find out more

Resources

The IAPP offers all the tools and information you need to get your job done. We’ve collected templates, forms, charts and checklists to help you with everything you can think of, from privacy notices to data breach response to cybersecurity and beyond.Find out more

Conferences

There’s no better way to experience the IAPP community. Whether you’re looking for education, networking or access to privacy experts and regulators, IAPP conferences are where it’s at. We host eight premier conferences around the world each year.Find out more