ACI-001 Online Ad Campaign r7_response 728x90
CM
DPI15_300x250_Banner_FINAL
AsiaPF15_300x250_Banner_FINAL

(Mar 24, 2015) Several witnesses appeared before the House Energy and Commerce subcommittee on Tuesday to testify about the rapidly growing Internet-of-Things (IoT) ecosystem. With approximately 25 billion connected devices in existence, and counting, the economic benefits and job opportunities in IoT appears to be eclipsing any significant Congressional motivation to regulate this landscape. In fact, the hearing followed an IoT showcase hosted by the subcommittee to demonstrate many of the technological inno... Read More

The Privacy Advisor

The FCC's New Rule Means Changes ... But For Whom?

(Mar 24, 2015) This week, Alamo Broadband and USTelecom each sued to block the Federal Communications Commission from enforcing its February order reclassifying broadband providers as “common carriers," or a public utility of sorts, and therefore subject to the same rules that regulate telecommunications companies. The suits exemplify a panicked stakeholder reaction to a potentially disruptive change: Some personal data Internet service providers currently use to generate revenue is now considered Consumer Pro... Read More

The Privacy Advisor

ECJ Hears Safe Harbor Arguments

(Mar 24, 2015) The European Court of Justice has heard arguments in a case originally brought by Austrian law student Max Schrems that was referred up the line to the EU's highest adjudicators. At issue is this: Does the Safe Harbor program adequately protect the rights of EU citizens when "compliant" companies are known to share EU citizen data with U.S. intelligence bodies? Read More

The Privacy Advisor

ITALY—Garante Launches Draft Code Consultation

(Mar 24, 2015) On February 19, the Italian Data Protection Authority, the Garante, published the notice of the launch of a public consultation on the draft of the "code of conduct and professional practice applying to the processing of personal data carried out for commercial information purposes.” The aim of this consultation is to acquire contributions and proposals by all stakeholders on the draft code, including trade associations representing the relevant industries. The above observations shall be subm... Read More

The Privacy Advisor

Monitoring Third-Party Vendors Means Managing Your Own Risk: Chapter Seven

By K Royal

(Mar 24, 2015) In chapter seven of this ongoing series, K Royal, CIPP/E, CIPP/US discusses the stage in the third-party vendor process in which the chosen vendor has been contracted and the spend has been made. That’s not where diligence ends, however. Now it’s time to make some management decisions, like the timing and frequency, scope and level of monitoring, and who’ll be responsible for that. Read More

The Privacy Advisor

Oregon AG Seeks Tougher State Breach Law

(Mar 24, 2015) Oregon Attorney General Ellen Rosenblum wants her state’s data breach notification law strengthened. She says that since the law was written in 2007, there’s been a dramatic increase in the retention of biometric information, which “presents a particularly serious kind of breach.” Back then, you only needed your fingerprint scanned for jobs such as working at the Pentagon. Now, we use the same scans to unlock our phones. Divonne Smoyer, CIPP/US, and Christine Czuprynski talk to Rosenblum about her efforts. Read More

The Privacy Advisor

Computer Forensics: The Key to Effective Incident Response

(Mar 24, 2015) "When the discussion of computer data breach incident response is brought up, very little if any mention is made of forensics," Todd Walls, Sr., CIPP/G, CIPM, writes. However, he suggests, the forensics team should be part organizations' computer incident-response teams. The forensics team "will allow your organization to determine the exact extent of the breach by determining what data was downloaded, saved and or printed," he writes, and can provide guidance to prevent future incidents. Read More

The Privacy Advisor