CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Data Privacy
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Data Privacy

Technological development has always outpaced privacy concerns, but never more so than in the past decade. Collection and centralization of personally identifiable information (PII), tracking of movements and digital surveillance are all at unprecedented levels. Regulations and laws are only just beginning to catch up to the ability of both governments and private entities to deploy these capabilities.

 

What exactly is there to worry about? The mass collection and centralization of data by giant multinationals such as Facebook and Google is as good of a place to start as any. Two decades of vacuuming up the personal data of users of various online services has created the most impressive marketing capabilities in history, but these profiles have astounding potential for damage when they are used the wrong way or fall into the wrong hands.

 

Unauthorized information that is captured in data breaches tends to find its way to massive “combo lists” that are sold and traded on the dark web. Social security numbers are added from this breach, home addresses and phone numbers from that one, personal health information from yet another. Soon, a frighteningly complete profile of millions of individuals is available to anyone willing to pay the asking price.

 

These are just the established data privacy issues. The emerging ones are even worse. High-quality facial recognition technology is just beginning to roll out across the public places of some countries. Artificial intelligence is not only making mass facial recognition possible, but magnifies the power and reach of any application that involves capturing and sorting information: scanning pictures, analyzing speech, sifting through text and location data. This threatens to not only shatter anonymity and privacy, but allow for highly advanced impersonation and take the concept of “identity theft” to new levels.

 

Some businesses chafe at the trouble and added expense of new and emerging data privacy regulations, but they are vital to both protecting rights and privacy and instilling confidence in end users. Customers want to be able to submit their payment information without worry about data breaches and identity theft, use services without wondering what is being done with their personal information and use devices without fear of surveillance or having location data tracked. The need for meaningful safeguards only grows greater as technological capabilities increase.

 

Image of woman using mobile phone in front of laptop signifying anger over the breach of privacy by China Internet giants
Data PrivacyNews

Anger Over Alleged Breach of Privacy by China Internet Giants

January 15, 2018
Chinese Internet users have become much more vocal about what they perceive to be potential breach of privacy by China Internet Giants - Alibaba, Baidu and Tencent.
Read More
Image of satellite dish on rooftop overlooking a city representing China's social credit system
Data PrivacyInsights

China’s Social Credit System – An Episode out of Black Mirror?

December 22, 2017
China's Social Credit System is scores the reputation of citizens and businesses operating within its sovereign border, using data collected from social media, financial institutions and government records. The purpose is to increase trust, transparency and confidence in the domestic marketplace but at what cost?
Read More
Image of a open sign on shop window representing how the end of net neutrality and the open internet will impact data privacy and cyber security
Data PrivacyNews

Why the End of Net Neutrality and the Demise of the Open Internet Could Have Unintended Consequences for Data Privacy and Cyber Security

December 18, 2017
The FCC’s historic overturning of the Obama-era Net Neutrality rules could have profound implications for the Open Internet. While there are potential censorship and service pricing implications of this move, what are the long-term impact on data privacy and cyber security?
Read More
Image of group of girls looking at mobile phone representing changes in perception in customer privacy and digital trust
Data PrivacyNews

Changing Dimensions of Customer Privacy and Digital Trust

December 15, 2017
Companies must show that they are constantly innovating but they must also show that they are taking into account customer privacy and security to protect personal information. Those that can manage this delicate balancing act between customer privacy and digital trust will be the winners in the modern digital economy.
Read More
Businessman with binoculars spying on users, invasion of privacy by tracking online behavior
Data PrivacyInsights

Invasion of Privacy: Tracking Your Online Behavior Across the Web

December 6, 2017
The new “Tracking the Trackers” report showed that 79% of all websites globally are secretly tracking your online behavior. Moreover, many are, in turn, forwarding your personal information to other companies. For many, the message is clear: it’s time to take back the web and end this widespread invasion of privacy.
Read More
Image of Thailand skyline representing the impact of electronic marketing with the new computer crime act
Data PrivacyInsights

Electronic Marketing Under Thailand’s New Computer Crime Act

November 17, 2017
Thailand's new Computer Crime Act gets tough on electronic marketing and spammers will now face criminal charges and hefty penalties if found guilty.
Read More
Image of world map with data being transferred globally signifying how the Privacy Shield is adequate for data transfer but will need FISA reform
Data PrivacyNews

Privacy Shield “Adequate” for Data Transfer but Needs FISA Reform

November 13, 2017
U.S. doing an “adequate” job for Privacy Shield but could be doing more to protect the data transfer of EU users, including reform of the FISA regulations.
Read More
Image of crowded street with blurred faces signifying how data anonymization and pseudonymization should work under the EU GDPR
Data PrivacyInsights

Data Anonymization and Pseudonymization Under the GDPR

November 6, 2017
Can companies achieve true data anonymization to avoid weaker pseudonymization techniques and lessen the constraints of data privacy laws like the GDPR?
Read More
Image of hand holding mobile phone showing financial charts signifying the need for FinTech to protect the security and privacy of customer data
Data PrivacyInsights

Can FinTech Ensure the Security and Privacy of Customer Data?

October 24, 2017
With massive collection and use of customer data and now "alternative data", FinTech companies must prove their commitment to data privacy & cybersecurity.
Read More
Image of man in front of computer and identified by facial recognition technology signifying the concerns of privacy and mass surveillance
Data PrivacyInsights

Facial Recognition Technology Raises Privacy and Mass Surveillance Concerns

October 12, 2017
Use of facial recognition technology is growing in both public and private sectors amid increasing concerns over data privacy and mass surveillance.
Read More
1 … 66 67 68 69 70 … 74

Latest

Yodel delivery Service logo sign showing cyber incident suspected ransomware

Yodel Parcel Delivery Service Disrupted by a Suspected Ransomware Cyber Incident

Hacker exploit vulnerability Log4Shell on VMware servers

CISA and Coast Guard Cyber Command Warn About Hackers Leveraging Log4Shell Vulnerability on VMware Servers

Finger pointing at digital lock showing privacy enhancing technologies (PETs)

What Are Privacy-Enhancing Technologies (PETs) And How You Can Choose the Right One(s)

Peaceful demonstration against war with Lithuania flag showing Russian hackers DDoS cyber attacks

Russian Hackers Claim Responsibility for DDoS Cyber Attacks on Lithuania

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results