CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Data Privacy
Oldest
  • Latest
  • Oldest
  • Random
  • A to Z

Data Privacy

Technological development has always outpaced privacy concerns, but never more so than in the past decade. Collection and centralization of personally identifiable information (PII), tracking of movements and digital surveillance are all at unprecedented levels. Regulations and laws are only just beginning to catch up to the ability of both governments and private entities to deploy these capabilities.

 

What exactly is there to worry about? The mass collection and centralization of data by giant multinationals such as Facebook and Google is as good of a place to start as any. Two decades of vacuuming up the personal data of users of various online services has created the most impressive marketing capabilities in history, but these profiles have astounding potential for damage when they are used the wrong way or fall into the wrong hands.

 

Unauthorized information that is captured in data breaches tends to find its way to massive “combo lists” that are sold and traded on the dark web. Social security numbers are added from this breach, home addresses and phone numbers from that one, personal health information from yet another. Soon, a frighteningly complete profile of millions of individuals is available to anyone willing to pay the asking price.

 

These are just the established data privacy issues. The emerging ones are even worse. High-quality facial recognition technology is just beginning to roll out across the public places of some countries. Artificial intelligence is not only making mass facial recognition possible, but magnifies the power and reach of any application that involves capturing and sorting information: scanning pictures, analyzing speech, sifting through text and location data. This threatens to not only shatter anonymity and privacy, but allow for highly advanced impersonation and take the concept of “identity theft” to new levels.

 

Some businesses chafe at the trouble and added expense of new and emerging data privacy regulations, but they are vital to both protecting rights and privacy and instilling confidence in end users. Customers want to be able to submit their payment information without worry about data breaches and identity theft, use services without wondering what is being done with their personal information and use devices without fear of surveillance or having location data tracked. The need for meaningful safeguards only grows greater as technological capabilities increase.

 

Office people silhouettes with devices showing use of privacy enhancing technology
Data PrivacyInsights

Your Customers Want To Know Their Information Is Safe; Here’s How To Put Their Mind at Ease

February 9, 2022
Rather than businesses having to expose users’ personal data, and have data brokers collect that data into centralized storehouses, Privacy Enhancing Technology means that companies can work together directly, helping one another to vouch for and validate trustworthy users.
Read More
Headset and telephone on desk showing outsourcing at India call centre
Data PrivacyInsights

Call Detail Records: The Impact of India’s Revised Guidelines for Other Service Providers on Outsourcing Customers and Providers

February 11, 2022
India’s DoT now requires outsourcing providers in India to capture and store certain call records and system logs at their Indian delivery centers. Outsourcing customers should evaluate their agreements to ensure their information and that of their customers is safeguarded while complying with obligations under the Guidelines.
Read More
Hand holding a metal padlock on a background of personal data showing digital privacy is mission critical
Data PrivacyNews

“Mission Critical”: Report Documents Increasing Primacy of Digital Privacy, Consumer Distrust of AI

February 14, 2022
Increasingly a mission critical element, report notes that the return on investment (ROI) of mature digital privacy programs also continues to be high – particularly when privacy is aligned with security.
Read More
Woman holding phone with social media service Facebook on the screen showing Apple privacy changes
Data PrivacyNews

Facebook Suffers Anticipated $10 Billion Loss, Snapchat Rebounds From Apple Privacy Changes

February 16, 2022
Facebook is anticipating a loss of $10 billion to the Apple privacy changes in 2022, while Snapchat is in the midst of an overperforming Q1 that has seen the company's shares rally to increase 50% in value.
Read More
IRS building showing facial recognition technology backlash
Data PrivacyNews

IRS Scraps Plans to Use Facial Recognition Technology After Bipartisan Backlash

February 16, 2022
Lawmaker concerns about storage of biometric identification information and the use of a third-party contractor’s facial recognition technology has prompted a change in plans by the IRS.
Read More
Businessman working from home on laptop showing privacy management when hybrid and remote working
Data PrivacyInsights

Data Privacy in 2022: Protecting Data During the Age of Hybrid and Remote

February 21, 2022
In the age of hybrid and remote working, assess your corporation’s plan for data privacy management. Are you educating your employees about safe data sharing practices, and do you have the best infrastructure to mitigate data privacy risk and thwart future attacks?
Read More
Silhouette of a spy sitting in front of a monitor showing mass surveillance and data collection
Data PrivacyNews

CIA “Deep Dive” Studies Demonstrate Mass Surveillance, Say Senators; Bulk Domestic Data Collection Conducted for Years Without Oversight

February 21, 2022
New insight into a domestic data collection program run by the CIA indicates even more mass surveillance may have taken place, and some senators are demanding answers.
Read More
Google office seen at night with its illuminated Google logo sign showing privacy changes for ad tracking
Data PrivacyNews

Google Plans New Privacy Changes for Ad Tracking: “Privacy Sandbox” Being Expanded to Android, Positioning as Less “Blunt” Alternative to Apple

February 22, 2022
Google recently announced that its Privacy Sandbox initiative is now also being rolled out for Android, in a move comparable to the ad tracking privacy changes made by Apple in 2021.
Read More
Facebook and Meta logo on screens showing privacy lawsuit
Data PrivacyNews

Facebook Settles Old Privacy Lawsuit for $90 Million; Proceeds to be Divided Between Users

February 23, 2022
If the court approves the settlement, this long-running privacy lawsuit will finally be put to bed with $90 million (after the usual legal expenses) being parceled out to eligible users and Facebook forced to "sequester and delete" personal data.
Read More
Man working on future virtual interface screen on a laptop showing privacy automation for compliance
Data PrivacyInsights

Why Modern Privacy Security Requires Automation, Cross-Functional Team Collaboration

March 3, 2022
It is difficult to scale without privacy automation while anticipating how rapidly evolving enterprises use data and account for immediate compliance requirements. A more modern privacy approach is to leverage technology, automation, and data management to create an integrated hybrid strategy for compliance.
Read More
1 … 67 68 69 70 71 … 73

Latest

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results