CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Data Privacy
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Data Privacy

Technological development has always outpaced privacy concerns, but never more so than in the past decade. Collection and centralization of personally identifiable information (PII), tracking of movements and digital surveillance are all at unprecedented levels. Regulations and laws are only just beginning to catch up to the ability of both governments and private entities to deploy these capabilities.

 

What exactly is there to worry about? The mass collection and centralization of data by giant multinationals such as Facebook and Google is as good of a place to start as any. Two decades of vacuuming up the personal data of users of various online services has created the most impressive marketing capabilities in history, but these profiles have astounding potential for damage when they are used the wrong way or fall into the wrong hands.

 

Unauthorized information that is captured in data breaches tends to find its way to massive “combo lists” that are sold and traded on the dark web. Social security numbers are added from this breach, home addresses and phone numbers from that one, personal health information from yet another. Soon, a frighteningly complete profile of millions of individuals is available to anyone willing to pay the asking price.

 

These are just the established data privacy issues. The emerging ones are even worse. High-quality facial recognition technology is just beginning to roll out across the public places of some countries. Artificial intelligence is not only making mass facial recognition possible, but magnifies the power and reach of any application that involves capturing and sorting information: scanning pictures, analyzing speech, sifting through text and location data. This threatens to not only shatter anonymity and privacy, but allow for highly advanced impersonation and take the concept of “identity theft” to new levels.

 

Some businesses chafe at the trouble and added expense of new and emerging data privacy regulations, but they are vital to both protecting rights and privacy and instilling confidence in end users. Customers want to be able to submit their payment information without worry about data breaches and identity theft, use services without wondering what is being done with their personal information and use devices without fear of surveillance or having location data tracked. The need for meaningful safeguards only grows greater as technological capabilities increase.

 

Photo of night market with colorful tents and retail shops
BlogsData PrivacyFuture of Privacy

Never Say Never: Your Data Is Yours, Get Paid for It

May 29, 2018
With high-profile scandals and the seemingly daily buzz of breaches, scams and exploits, it’s more and more obvious that the data points that make up your online profiles are a hot commodity. Time for the citizenry to take back their personal data and bring back responsibility into the ecosystem.
Read More
Image of man propping up a stack of blocks using a block showing how Big Tech are too big to fail and will require government support
Data PrivacyInsights

Is Big Tech Too Big to Fail?

May 28, 2018
In the aftermath of the Cambridge Analytica scandal, many have suggested that Facebook be regulated, fined and perhaps even broken up. After all, if the FTC were to invoke its full power, it could theoretically levy hundreds of millions of dollars of fines, crippling Facebook. But is a big tech company too big to fail?
Read More
Image of man making judgement and holding up a red card showing the difficulty of regulating privacy as shown by the Facebook Cambridge Analytica case
Data PrivacyInsights

Facebook Cambridge Analytica Case Shows the Difficulty of Regulating Privacy

May 21, 2018
The congressional testimony was supposed to establish a national debate about data privacy and the right of users to protect their data from being sold, used, or analyzed in ways that were never intended. Instead, it has become very clear that regulating privacy is harder than anyone originally expected.
Read More
Closeup portrait dumb looking clueless man arms out
BlogsData PrivacyPrivacy Intelligence

Your View of “Personal Information” is Probably Not Wide Enough

May 17, 2018
In the past few months the amount of talk, advice, debates, and claims about the EU GDPR which goes into effect May 25, has escalated to a fever pitch. And there is the rub. Most organizations do not know really know or understand what “personal data,” the GDPR term, is as it applies to their organization.
Read More
Image of digital world with data-driven technologies and network communications
Data PrivacyInsights

Ethics at the Core of a Data-Driven World

May 16, 2018
As the technologies for gathering, analysing, and acting on information become increasingly powerful, we find ourselves facing a tipping point as we consider the impact of data-driven processes on the ethics in information management and the challenges of managing data privacy.
Read More
Image of bug on a keyboard representing whether the privacy issues and data abuses faced by Facebook can be considered just a bug in the system
Data PrivacyNews

Are Privacy Issues and Data Abuses Really Just a Bug in the Facebook System?

May 14, 2018
In an effort to get out in front of the data privacy scandal threatening to engulf the company, Facebook recently announced a new data abuse bounty program, which promises to pay people who report data abuses. But is this new data abuse bounty program going to result in any real changes to data privacy on Facebook?
Read More
Image of hand removing block from a stack showing the perils of data security breaches as seen from the Cambridge Analytica bankruptcy filing
Data PrivacyNews

Cambridge Analytica Bankruptcy Shows the Perils of Data Security Breaches

May 9, 2018
After nearly two months of non-stop controversy and scandal over its improper use of Facebook data, Cambridge Analytica finally announced that it was ceasing operations, effective immediately. In doing so, Cambridge Analytica has become the new poster child to highlight the perils of data security breaches.
Read More
Image of Wall Street stock exchange showing how Facebook won’t care about privacy as share prices continue to rise
Data PrivacyInsights

Facebook Won’t Care About Privacy Until Wall Street Cares About Privacy

May 8, 2018
Companies, and even entire industries, are more afraid of Wall Street than they are of Washington. Instead of Facebook’s stock falling on privacy concerns, it is actually rising. Facebook has sensed that Wall Street doesn’t really care about privacy, and as long as Wall Street doesn’t care about privacy, why should it?
Read More
Image of man sitting behind laptop and hammer signifying the consent decree from the FTC settlement with Facebook
Data PrivacyInsights

What did the Consent Decree from the FTC Settlement with Facebook Really Change?

May 3, 2018
As much as Facebook would like to sweep the Cambridge Analytica data scandal under the rug, signs continue to mount that the company is still playing fast and loose with user data. All this raises the question of whether the 2011 FTC settlement that resulted in an 8-count consent decree actually went far enough.
Read More
Image of security pros standing in front of a maze and wondering how clueless governments can handle social media regulation
Data PrivacyNews

Security Pros Believe Governments Are Clueless but Should Impose Social Media Regulation

May 2, 2018
Seventy percent of security pros want governments to impose social media regulation for the collection of personal data by social media companies. Yet, expectations are hazy and 72% also indicated that they have little to no faith that government officials have an understanding of the threats to digital privacy.
Read More
1 … 65 66 67 68 69 … 76

Latest

Cisco logo on a wall showing network breach due to voice phishing and MFA fatigue

Cisco Network Breach Traced Back To Compromised Personal Google Account; Sophisticated Attacker Used Combination of Voice Phishing and MFA Fatigue

Empty control center showing cybersecurity workforce gap and DevSecOps divide

Stop Fretting About Hiring Security Specialists

Digital pictures on blurry dark background showing FTC rules on consumer data and commercial surveillance

Proposed FTC Rules Address Commercial Surveillance, Represent Seismic Shift in Handling of Consumer Data

Man using magnifying glass showing SOC 2 for data protection

Want To Turn Your Data Protection Practices Into a Competitive Advantage? Get SOC 2 Compliant

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results