ACI-001 Online Ad Campaign r7_response 728x90
CS15_300x250_Banner_FINAL

AsiaPF15_300x250_Banner_FINAL

(Apr 28, 2015) Not surprisingly, the topic of great import at the IAPP’s Data Protection Intensive was the General Data Protection Regulation, but there were a lot of other discussions as well. We round up the conference’s highlights. Read More

The Privacy Advisor

Illinois AG Targets ID Theft, Earlier Breach Notification

(Apr 28, 2015) Illinois Attorney General Lisa Madigan has spent the last decade focused on consumer privacy and data security issues, from the passage of data breach legislation in 2005 to her testimony in front of Congress earlier this year on federal data breach legislation. Christine Czuprynski and Divonne Smoyer, CIPP/US, talk to Madigan about why state AGs are so focused on privacy these days and her aims to protect student and biometric data. Read More

The Privacy Advisor

How To Operationalize the PIA

(Apr 28, 2015) Michael Hamilton, CIPP/E, CIPP/US, and Patrick Curry, CIPP/US, work for McKesson, a large healthcare services company. Because the company frequently needs to transfer protected health information from one department in the company to another, it’s developed a privacy impact assessment process to mitigate risk. Doing so has helped the company stay privacy smart in a number of ways, including frequently reassessing risk. Read More

The Privacy Advisor

Vendor Management Means Managing Your Own Risk: Part Eight

By K Royal

(Apr 28, 2015) The first step to mitigate the risk of data breaches through vendors is to have an effective vendor-management program. It’s the best way to ensure that your vendors are doing their jobs correctly, understanding, of course, that one can delegate responsibility, but not accountability. K Royal, CIPP/E, CIPP/US, offers tips on how best to avoid a breach via your vendor. Read More

The Privacy Advisor

Book Review: Krebs Gives Insights Into Spam Wars

(Apr 28, 2015) In Spam Nation, Brian Krebs takes a fascinating inside look into the extraordinarily complex world behind spam. Have you ever wanted to know who or what is behind spam? Or why pharmaceuticals are frequently the subject matter for it? Who is making money off of it? And maybe most importantly, why is it so challenging to make it stop? Cindy Hahn, CIPP/US, reviews. Read More

The Privacy Advisor

Privacy in the Classroom: What You Need To Know About Educational Software

(Apr 28, 2015) Research released in January 2015 shows that educational applications are the second most popular category in the Apple App Store, comprising just over 10 percent of all app downloads. This indicates a tremendous interest in learning applications across a wide, technically savvy—and growing—demographic, Eduard Goodman, CIPP/C, CIPP/E, CIPP/US, reports. And a lack of regulations and guidelines means privacy isn't always a priority. Read More

The Privacy Advisor

Ohlhausen To RSA: Be Reasonable; That’s All

(Apr 22, 2015) The Federal Trade Commission (FTC) is a privacy regulator, sure. But it’s not out to get the good guys trying to do the right thing. It’s primary concern is making sure organizations are keeping the privacy promises they make to consumers. That was how Federal Trade Commissioner Maureen Ohlhausen kicked off her keynote address at the IAPP’s preconference session at RSA, “Engineering Privacy: Why Security Isn’t Enough.” Read More

The Privacy Advisor