CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Data Privacy
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Data Privacy

Technological development has always outpaced privacy concerns, but never more so than in the past decade. Collection and centralization of personally identifiable information (PII), tracking of movements and digital surveillance are all at unprecedented levels. Regulations and laws are only just beginning to catch up to the ability of both governments and private entities to deploy these capabilities.

 

What exactly is there to worry about? The mass collection and centralization of data by giant multinationals such as Facebook and Google is as good of a place to start as any. Two decades of vacuuming up the personal data of users of various online services has created the most impressive marketing capabilities in history, but these profiles have astounding potential for damage when they are used the wrong way or fall into the wrong hands.

 

Unauthorized information that is captured in data breaches tends to find its way to massive “combo lists” that are sold and traded on the dark web. Social security numbers are added from this breach, home addresses and phone numbers from that one, personal health information from yet another. Soon, a frighteningly complete profile of millions of individuals is available to anyone willing to pay the asking price.

 

These are just the established data privacy issues. The emerging ones are even worse. High-quality facial recognition technology is just beginning to roll out across the public places of some countries. Artificial intelligence is not only making mass facial recognition possible, but magnifies the power and reach of any application that involves capturing and sorting information: scanning pictures, analyzing speech, sifting through text and location data. This threatens to not only shatter anonymity and privacy, but allow for highly advanced impersonation and take the concept of “identity theft” to new levels.

 

Some businesses chafe at the trouble and added expense of new and emerging data privacy regulations, but they are vital to both protecting rights and privacy and instilling confidence in end users. Customers want to be able to submit their payment information without worry about data breaches and identity theft, use services without wondering what is being done with their personal information and use devices without fear of surveillance or having location data tracked. The need for meaningful safeguards only grows greater as technological capabilities increase.

 

Image of man putting a block on a house model signifying a company starting up and buidling their first privacy program
Data PrivacyInsights

Starting Up: Building Your Company’s First Privacy Program

January 31, 2018
Your job as a new CPO is to lay the foundation, merge any existing and new pieces into one privacy program and then lead the way on all things privacy. Where do you start? What are the priorities? How do you introduce privacy concepts to the company? You need a plan.
Read More
Image of clock on a keyboard signifying how Data Privacy Day 2018 has come at an important time in the privacy and security debate
Data PrivacyNews

Data Privacy Day 2018 Comes at an Important Time in the Privacy and Security Debate

January 29, 2018
The 10th anniversary of national Data Privacy Day celebrated on January 28 couldn't have come at a better time for Internet users with the past 12 months filled with stories about cyber security attacks, election meddling, state surveillance, and massive corporate data breaches.
Read More
Image showing control of data transmission over global network representing repeal of U.S. broadband privacy rules
Data PrivacyInsights

Looking Back at the 2017 Repeal of U.S. Broadband Privacy Rules

January 17, 2018
Consumer privacy took a body blow in 2017 when U.S. President Donald Trump signed a repeal of the broadband privacy rules. Increasingly, the complex nature of privacy in the age of the internet is putting the fraught relationship between government, big business and the man on the street to the test.
Read More
Image of woman using mobile phone in front of laptop signifying anger over the breach of privacy by China Internet giants
Data PrivacyNews

Anger Over Alleged Breach of Privacy by China Internet Giants

January 15, 2018
Chinese Internet users have become much more vocal about what they perceive to be potential breach of privacy by China Internet Giants - Alibaba, Baidu and Tencent.
Read More
Image of satellite dish on rooftop overlooking a city representing China's social credit system
Data PrivacyInsights

China’s Social Credit System – An Episode out of Black Mirror?

December 22, 2017
China's Social Credit System is scores the reputation of citizens and businesses operating within its sovereign border, using data collected from social media, financial institutions and government records. The purpose is to increase trust, transparency and confidence in the domestic marketplace but at what cost?
Read More
Image of a open sign on shop window representing how the end of net neutrality and the open internet will impact data privacy and cyber security
Data PrivacyNews

Why the End of Net Neutrality and the Demise of the Open Internet Could Have Unintended Consequences for Data Privacy and Cyber Security

December 18, 2017
The FCC’s historic overturning of the Obama-era Net Neutrality rules could have profound implications for the Open Internet. While there are potential censorship and service pricing implications of this move, what are the long-term impact on data privacy and cyber security?
Read More
Image of group of girls looking at mobile phone representing changes in perception in customer privacy and digital trust
Data PrivacyNews

Changing Dimensions of Customer Privacy and Digital Trust

December 15, 2017
Companies must show that they are constantly innovating but they must also show that they are taking into account customer privacy and security to protect personal information. Those that can manage this delicate balancing act between customer privacy and digital trust will be the winners in the modern digital economy.
Read More
Businessman with binoculars spying on users, invasion of privacy by tracking online behavior
Data PrivacyInsights

Invasion of Privacy: Tracking Your Online Behavior Across the Web

December 6, 2017
The new “Tracking the Trackers” report showed that 79% of all websites globally are secretly tracking your online behavior. Moreover, many are, in turn, forwarding your personal information to other companies. For many, the message is clear: it’s time to take back the web and end this widespread invasion of privacy.
Read More
Image of Thailand skyline representing the impact of electronic marketing with the new computer crime act
Data PrivacyInsights

Electronic Marketing Under Thailand’s New Computer Crime Act

November 17, 2017
Thailand's new Computer Crime Act gets tough on electronic marketing and spammers will now face criminal charges and hefty penalties if found guilty.
Read More
Image of world map with data being transferred globally signifying how the Privacy Shield is adequate for data transfer but will need FISA reform
Data PrivacyNews

Privacy Shield “Adequate” for Data Transfer but Needs FISA Reform

November 13, 2017
U.S. doing an “adequate” job for Privacy Shield but could be doing more to protect the data transfer of EU users, including reform of the FISA regulations.
Read More
1 … 68 69 70 71 72 … 76

Latest

Cisco logo on a wall showing network breach due to voice phishing and MFA fatigue

Cisco Network Breach Traced Back To Compromised Personal Google Account; Sophisticated Attacker Used Combination of Voice Phishing and MFA Fatigue

Empty control center showing cybersecurity workforce gap and DevSecOps divide

Stop Fretting About Hiring Security Specialists

Digital pictures on blurry dark background showing FTC rules on consumer data and commercial surveillance

Proposed FTC Rules Address Commercial Surveillance, Represent Seismic Shift in Handling of Consumer Data

Man using magnifying glass showing SOC 2 for data protection

Want To Turn Your Data Protection Practices Into a Competitive Advantage? Get SOC 2 Compliant

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results