Digital transformation is more than a buzzword. It is the launchpad for companies across the economy transforming their business models to capitalize on the new opportunities being unleashed by innovations rapidly transforming our world. However, digital transformation requires more than flipping a switch as companies find themselves navigating a new world of legal risk and […]
publication
On Monday Data Privacy Monitor published its fourth annual Data Security Incident Response Report, which provides an analysis of the more than 560 cyber incidents handled by the team in 2017. Reflecting on the increasingly sophisticated nature of attacks, the aggressiveness by regulators in researching breaches and the expectations of highly developed responses, the report […]
This week the Center for Internet Security (CIS) released CIS Controls Version 7 , the newest (and free) iteration of 20 very important cybersecurity recommendations that we recommend whenever we lecture. The CIS Controls are a prioritized set of actions any organization can follow to improve their cybersecurity posture. The new controls were developed to […]
The 2017 EDPS Annual Report presents an overview of all EDPS activities in 2017 and priorities for 2018, as well as analysing the progress made in achieving the aims set out in the EDPS Strategy. With 2018 set to be a landmark year for data protection, the EDPS remains committed to ensuring that the EU […]
The International Journal of Communication has published new Special Section on “Privacy at the Margins” with 10 articles from international scholars. Those articles look at a range of privacy experiences around the world. Source: Privacy at the Margins « Data Protection Blog
IAB Europe today released the draft technical specifications for its GDPR Transparency & Consent Framework (“Framework”) for public comment. First announced in November 2017, the Framework is a cross-industry effort to help publishers, technology vendors, agencies and advertisers meet the transparency and user choice requirements (including consent where necessary) of the GDPR before the regulation […]
Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP issued a white paper on GDPR Implementation in Respect of Children’s Data and Consent (the “White Paper”). The White Paper sets forth guidance and recommendations concerning the application of GDPR requirements to the processing of children’s personal data. Source: CIPL Issues White Paper on […]
n recent months, both Deputy Attorney General Rod Rosenstein and FBI Director Christopher Wray have been calling for holes in encryption law enforcement can drive a warrant through. Both have no idea how this can be accomplished, but both are reasonably sure tech companies can figure it out for them. And if some sort of […]
The growing internet of things and increasingly sophisticated malware are putting global organizations at a greater risk for cyberattacks, but leaders aren’t doing enough to bolster their groups’ security, according to a pair of reports. Researchers at Raytheon and the Ponemon Institute found more than 80 percent of cybersecurity and IT experts predict unsecured internet […]
The ‘responsible encryption’ demanded by law enforcement and some politicians will not prevent criminals ‘going dark’; will weaken cyber security for innocent Americans; and will have a hit on the U.S. economy. At the same time, there are existing legal methods for law enforcement to gain access to devices without requiring new legislation. These are […]