CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Data Privacy
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Data Privacy

Technological development has always outpaced privacy concerns, but never more so than in the past decade. Collection and centralization of personally identifiable information (PII), tracking of movements and digital surveillance are all at unprecedented levels. Regulations and laws are only just beginning to catch up to the ability of both governments and private entities to deploy these capabilities.

 

What exactly is there to worry about? The mass collection and centralization of data by giant multinationals such as Facebook and Google is as good of a place to start as any. Two decades of vacuuming up the personal data of users of various online services has created the most impressive marketing capabilities in history, but these profiles have astounding potential for damage when they are used the wrong way or fall into the wrong hands.

 

Unauthorized information that is captured in data breaches tends to find its way to massive “combo lists” that are sold and traded on the dark web. Social security numbers are added from this breach, home addresses and phone numbers from that one, personal health information from yet another. Soon, a frighteningly complete profile of millions of individuals is available to anyone willing to pay the asking price.

 

These are just the established data privacy issues. The emerging ones are even worse. High-quality facial recognition technology is just beginning to roll out across the public places of some countries. Artificial intelligence is not only making mass facial recognition possible, but magnifies the power and reach of any application that involves capturing and sorting information: scanning pictures, analyzing speech, sifting through text and location data. This threatens to not only shatter anonymity and privacy, but allow for highly advanced impersonation and take the concept of “identity theft” to new levels.

 

Some businesses chafe at the trouble and added expense of new and emerging data privacy regulations, but they are vital to both protecting rights and privacy and instilling confidence in end users. Customers want to be able to submit their payment information without worry about data breaches and identity theft, use services without wondering what is being done with their personal information and use devices without fear of surveillance or having location data tracked. The need for meaningful safeguards only grows greater as technological capabilities increase.

 

Futuristic road transportation technology showing AI-enabled surveillance cameras
Data PrivacyNews

Little-Known TALON Network of Surveillance Cameras Now Blankets Much of the United States; AI-Enabled License Plate Reader, Object Recognition Technology Spreads in Private Neighborhoods

March 16, 2021
Little-known private network of surveillance cameras called TALON has quietly taken hold in neighborhoods throughout the country with AI-enabled cameras have the ability to recognize objects (and people). Read More
Female hand holds a wooden gavel showing complications and contradictions of privacy regulations
Data PrivacyInsights

Lawmakers Are Conflating Privacy and Security, and That’s Bad for Everyone

March 12, 2021
The term “privacy” has officially become a homonym. How do we move forward when language, even basic definitions, are often at odds or even completely contradictory? Read More
Network digital hologram on city background showing negative view of Big Tech
Data PrivacyNews

New Polling Reveals Increasingly Negative Views of Big Tech, Strong Public Support for Regulation

March 3, 2021
As of 2019, Big Tech companies were not particularly popular as a new poll shows that negative views have increased since then, with only 34% of Americans now expressing any level of positive opinion. Read More
Technology screen with abstract network patterns over downtown San Francisco skyscrapers showing net neutrality challenge by Internet providers
Data PrivacyNews

2018 California Net Neutrality Law Finally Clear to Be Enforced in Wake of Unsuccessful Challenge by Internet Providers

March 2, 2021
California’s 2018 net neutrality law will now be enforced after a challenge by the state's biggest internet providers was shot down by an Eastern District of California judge. Read More
Man holding tablet with people icons with locks showing data security for privacy strategy
Data PrivacyInsights

Amping Data Security Can Boost Your Privacy Strategy

March 2, 2021
Regulatory bodies around the world will continue to implement rules and penalties related to maintaining privacy. The NIST Privacy Framework offers some valuable guidelines for continuous compliance. Read More
Use of facial recognition technology
Data PrivacyNews

Facial Recognition Systems Scan 23 Million People at US Borders, Come up With Zero Imposters

February 23, 2021
23 million border crossers entering the United States were subject to facial recognition scans in 2020. Of these, it appears not one was determined to be an imposter at any of the country's airports. Read More
Little girl using digital tablet showing consumer protection complaints against TikTok
Data PrivacyNews

TikTok Faces Barrage of New Complaints From EU Consumer Protection Groups

February 22, 2021
A consumer protection group has filed complaints against the social media giant: failure to protect children, unfair terms of video use and data collection misrepresentations among others. Read More
People on street in Hong Kong at night showing PRC disinformation campaigns
Data PrivacyNews

PRC Spying, Malware and Disinformation Campaigns Push Hong Kong Dissidents to Underground Communications Channels

February 19, 2021
Report finds that aggressive disinformation campaigns and related measures have forced Hong Kong organizers to move to the digital underground, using encryption and the dark web. Read More
Hands typing on keyboard showing monitoring app on student computers
Data PrivacyNews

Singapore Government Plan To Install Monitoring App on Student Computers Meets With Resistance From Privacy Groups, NGOs

February 18, 2021
Singapore’s free student computers will come packed with a potentially unwelcome addition: a monitoring app that allows teachers to view and control the screens remotely. Read More
Woman in city street wearing face mask protective for COVID-19 showing trends for new normal
Data PrivacyInsights

Post COVID-19: Trends for the Next Normal

February 17, 2021
Even if the battle is won against COVID-19, the next normal will be different. Here are some lessons learned and trends to look out for. Read More
Load More

Latest

Clubhouse application on mobile phone screen showing threat of data scraping

Clubhouse Joins Facebook and LinkedIn as Target of Data Scraping; Cumulative One Billion User Profiles Have Been Leaked

Three men in bar with smartphones in hands showing challenges with DevSecOps

Developers, Security and Operations Walk into a Bar…

SAP system on virtual screen showing cyber attack on security vulnerabilities

Hackers Exploit Known Sap Security Vulnerabilities With a Typical Cyber Attack Succeeding In Record Time

Engineer checking intelligent factory showing state of IoT security

New Tripwire Survey: IoT Security Still in Shambles, Most Security Pros Struggling To Make Devices Fit Safely Into Business Networks

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Data Breach Regulations EU GDPR Cyber Threat
See all results