ACI-001 Online Ad Campaign r7_response 728x90
CM

DPI15_300x250_Banner_FINAL
Certification_CIPT_300x250final-01

(Mar 5, 2015) Scott Shipman, CIPP/US, has a job in front of him: Build the start-up’s privacy program and do it right. For some, it could be an intimidating project. Founded in 2013, Sensity is doing some pretty cutting-edge stuff, using the global conversion to LED lighting to deploy a high-speed, sensor-based light sensory network (LSN) with sensors, analytics and wireless communications to enable solutions for applications and services like public safety, environmental and weather monitoring, parking management and location analytics. But this isn’t his first rodeo. Read More

The Privacy Advisor

Real Tools for Privacy Management

(Mar 5, 2015) “New information technology is at the heart of so many of the privacy challenges we face today—big data, Internet of things, metadata analysis—but the technology we actually use to solve privacy problems is just this side of the Stone Age,” Daniel Weitzner writes in this post for Privacy Tech. Privacy policies are necessary but, on their own, they’re hardly sufficient, and even the steps involved in creating and maintaining a privacy program “cannot possibly keep up with the scale, scope and velocity of data being processed by today’s large, information-intensive organizations,” he writes. Instead, Weitzner suggests, “A new approach to privacy management is necessary in order to enable organizations to handle data at scale and simultaneously remain consistent with the high standards of privacy protection.” Read More

Daily Dashboard

His Plan: Create A Privacy Program That Promotes Social Good

(Mar 5, 2015) He has a job in front of him: Build Sensity’s privacy program and do it right. For some, it could be an intimidating project. Founded in 2013, the start-up is doing some pretty cutting-edge stuff, using the global conversion to LED lighting  to deploy a high-speed, sensor-based light sensory network with sensors, analytics and wireless communications to enable solutions for applications and services like public safety, environmental and weather monitoring, parking management and location analytics. But this isn’t the first rodeo for Scott Shipman, CIPP/US. After 17 years in the thick of it, he knows a couple of things about building smart privacy programs, reports Angelique Carson, CIPP/US, in this exclusive for The Privacy Advisor. Read More

Daily Dashboard

A Deep and Dangerous Dive Into Safe Harbor

(Mar 5, 2015) It’s no secret that Safe Harbor has been under fire from critics in Europe for some time—particularly since the initial Snowden disclosures in 2013. In some respects, it’s highlighted the tensions between the EU and U.S. regarding privacy and data protection. With a “growing discomfort with Safe Harbor in Europe in general and Germany in particular,” GFT Technologies Chief Privacy Officer Ernst-Oliver Wilhelm, CIPP/E, CIPM, CIPT, writes, “historical analysis suggests that these differences in the transatlantic relationship have already existed long before the Internet.” In this in-depth post for Privacy Perspectives, Wilhelm describes some of these cultural differences and compares the future of Safe Harbor to the navigation by the famed Ulysses between the mythically treacherous Scylla and Charybdis. Read More

Daily Dashboard

Wong: CPBR Gives Framework for National Privacy Discussion

(Mar 5, 2015) As The Privacy Advisor reported earlier this week, President Barack Obama’s release of the proposed Consumer Privacy Bill of Rights Act (CPBR) has been met with an array of reactions. Among the recent reports on the CPBR, The National Law Review and Lexology examine the bill in detail. And the reaction pieces include Sen. Al Franken (D-MN) stating the CPBR “lacks the necessary teeth to hold companies accountable for their privacy policies and to ensure robust protections for consumers’ informati... Read More

Daily Dashboard

Your Organization May Have Been Breached. When Do You Disclose?

(Mar 5, 2015) During Data Breach Notification Bootcamp at the IAPP Global Privacy Summit in Washington, DC, on Wednesday, Liisa Thomas led a packed room through a privacy pro's hypothetical nightmare: Your organization has detected a potential breach incident. Now what do you do? The Privacy Advisor Editor Angelique Carson, CIPP/US, outlines the next steps, the questions you need to ask and how your PR team needs to respond. And breach headlines continue to abound, with the latest media reports focused on inc... Read More

Daily Dashboard

Demystifying Privacy Engineering

(Mar 5, 2015) The Marriott Marquis in Washington, DC, was abuzz Wednesday with a flurry of connection and conversation at the IAPP Global Privacy Summit. A day of preconference workshops meant deep explorations into essential education for a wide range of privacy pros. Jedidiah Bracy, CIPP/US, CIPP/E, attended a session dedicated to the emerging, yet perhaps still mysterious, profession of privacy engineering. Understanding this new but important field is no small task, and Bracy provides insights into some—just some—of what he learned in this post for Privacy Tech. Led by “a fantastic panel of privacy engineers, policy analysts as well as privacy and security experts, ‘Piecing Together the Privacy Engineering Puzzle’ was not for the faint of heart,” he writes. Read More

Daily Dashboard

Fieldfisher Releases “Managing Global Data Residency Risk” Report

(Mar 5, 2015) Fieldfisher has announced the publication of its "Managing Global Data Residency Risk" report in conjunction with this week’s Global Privacy Summit. The report provides an in-depth look at issues around Data Residency Rules—laws prohibiting the transfer of personal data from specific countries or regions unless certain legal standards are met—and legal solutions that enable international data exports. “In an increasingly data-hungry and interconnected world, data protection issues co... Read More

Daily Dashboard