E-signatures can prove conclusion of data processing agreements
The use of electronic signatures (e-signatures) can prove that data processing contracts have been concluded and their terms agreed to, […]
The use of electronic signatures (e-signatures) can prove that data processing contracts have been concluded and their terms agreed to, […]
Security experts almost uniformly agree that it is dangerous to design encryption to ensure investigators can have access to everything. […]
There is an elephant in the room to address here: Understanding data privacy is fundamentally boring, if not unintelligible, to […]
“If privacy is truly a thing of the past, then people should at least profit off their own personal information.” […]
GoDaddy and WHOIS.com appear to have selectively redacted the information only for registrants providing an EU contact address. In light […]
In the run-up to May 25, 2018, many businesses that thought they were well-prepared to meet their new General Data […]
Given the repercussions of getting GDPR compliance wrong, businesses could be forgiven for not wanting to collect any data about […]
Startups are producing lots of transit data that could help inform government policy — but not everyone agrees on what […]
As Canada moves to legalize marijuana and online sales become commonplace, privacy concerns can’t be an afterthought; they must be […]
Google and Facebook are easy scapegoats, but companies have been collecting, selling, and reusing your personal data for decades, and […]
Machine learning and artificial intelligence can help guard against cyberattacks, but hackers can foil security algorithms by targeting the data […]
The Internet of Things has created a reliance on technology for many of us on both a personal and a […]