ACI-001 Online Ad Campaign r7_response 728x90
Certification_CIPT_300x250final-01
PrivacyTraining_ad300x250.Promo1-01
AsiaPF15_300x250_Banner_FINAL

(Apr 28, 2015) For a new CPO challenged with creating a privacy program, step one developing an internal policy, of course. But policy doesn't create a "culture of privacy" at an organization, which is essential to a successful privacy program. In part two of this quarterly series, Stephen Bolinger, CIPP/E, CIPP/G, CIPP/US, CIPM, who spent years at tech giant Microsoft, shares some of the strategic and tactical decisions along the way as a first-time CPO at start-up TeleSign, including how to create privacy pros to help you get the job done—whether they know it or not. Read More

The Privacy Advisor

Illinois AG Targets ID Theft, Earlier Breach Notification

(Apr 28, 2015) Illinois Attorney General Lisa Madigan has spent the last decade focused on consumer privacy and data security issues, from the passage of data breach legislation in 2005 to her testimony in front of Congress earlier this year on federal data breach legislation. Christine Czuprynski and Divonne Smoyer, CIPP/US, talk to Madigan about why state AGs are so focused on privacy these days and her aims to protect student and biometric data. Read More

The Privacy Advisor

Monitoring Your Privacy Program: Part Four

(Apr 28, 2015) In the fourth part of this series, Deidre Rodriguez, CIPP/US, zooms in on the finance industry with Zoe Strickland, CIPP/G, CIPP/US, CIPT, chief privacy officer at JPMorgan Chase. Strickland discusses where to start on building a monitoring program, documenting in a central location and focusing on top risks, among other essential steps a privacy pro should take. Read More

The Privacy Advisor

How To Operationalize the PIA

(Apr 28, 2015) Michael Hamilton, CIPP/E, CIPP/US, and Patrick Curry, CIPP/US, work for McKesson, a large healthcare services company. Because the company frequently needs to transfer protected health information from one department in the company to another, it’s developed a privacy impact assessment process to mitigate risk. Doing so has helped the company stay privacy smart in a number of ways, including frequently reassessing risk. Read More

The Privacy Advisor

Vendor Management Means Managing Your Own Risk: Part Eight

By K Royal

(Apr 28, 2015) The first step to mitigate the risk of data breaches through vendors is to have an effective vendor-management program. It’s the best way to ensure that your vendors are doing their jobs correctly, understanding, of course, that one can delegate responsibility, but not accountability. K Royal, CIPP/E, CIPP/US, offers tips on how best to avoid a breach via your vendor. Read More

The Privacy Advisor

Book Review: Krebs Gives Insights Into Spam Wars

(Apr 28, 2015) In Spam Nation, Brian Krebs takes a fascinating inside look into the extraordinarily complex world behind spam. Have you ever wanted to know who or what is behind spam? Or why pharmaceuticals are frequently the subject matter for it? Who is making money off of it? And maybe most importantly, why is it so challenging to make it stop? Cindy Hahn, CIPP/US, reviews. Read More

The Privacy Advisor

Privacy in the Classroom: What You Need To Know About Educational Software

(Apr 28, 2015) Research released in January 2015 shows that educational applications are the second most popular category in the Apple App Store, comprising just over 10 percent of all app downloads. This indicates a tremendous interest in learning applications across a wide, technically savvy—and growing—demographic, Eduard Goodman, CIPP/C, CIPP/E, CIPP/US, reports. And a lack of regulations and guidelines means privacy isn't always a priority. Read More

The Privacy Advisor