CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Data Privacy
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Data Privacy

Technological development has always outpaced privacy concerns, but never more so than in the past decade. Collection and centralization of personally identifiable information (PII), tracking of movements and digital surveillance are all at unprecedented levels. Regulations and laws are only just beginning to catch up to the ability of both governments and private entities to deploy these capabilities.

 

What exactly is there to worry about? The mass collection and centralization of data by giant multinationals such as Facebook and Google is as good of a place to start as any. Two decades of vacuuming up the personal data of users of various online services has created the most impressive marketing capabilities in history, but these profiles have astounding potential for damage when they are used the wrong way or fall into the wrong hands.

 

Unauthorized information that is captured in data breaches tends to find its way to massive “combo lists” that are sold and traded on the dark web. Social security numbers are added from this breach, home addresses and phone numbers from that one, personal health information from yet another. Soon, a frighteningly complete profile of millions of individuals is available to anyone willing to pay the asking price.

 

These are just the established data privacy issues. The emerging ones are even worse. High-quality facial recognition technology is just beginning to roll out across the public places of some countries. Artificial intelligence is not only making mass facial recognition possible, but magnifies the power and reach of any application that involves capturing and sorting information: scanning pictures, analyzing speech, sifting through text and location data. This threatens to not only shatter anonymity and privacy, but allow for highly advanced impersonation and take the concept of “identity theft” to new levels.

 

Some businesses chafe at the trouble and added expense of new and emerging data privacy regulations, but they are vital to both protecting rights and privacy and instilling confidence in end users. Customers want to be able to submit their payment information without worry about data breaches and identity theft, use services without wondering what is being done with their personal information and use devices without fear of surveillance or having location data tracked. The need for meaningful safeguards only grows greater as technological capabilities increase.

 

Image of warming sign on wall representing government surveillance and the consideration of security and privacy
Data PrivacyInsights

Government Surveillance, Security and Privacy: Does Security Always Win? (Part I)

January 25, 2017
In this first part of a two-part series, we explore some of the issues around government surveillance and the search for that elusive balance between security and privacy. In this first part, we explore how serious the threat of cyber snooping by government surveillance is and why we shouldn’t panic just yet.
Read More
Image of team of engineers and business people looking at plans on a table representing the operationalising of the EU GDPR and Privacy by Design
Data PrivacyInsights

Operationalising GDPR and Privacy by Design

November 25, 2016
We give some insight into how companies could use a privacy impact assessment (PIA) in conjunction with data mapping practices to understand how data flows through an organisation, making it the perfect tool to document and track new initiatives.
Read More
Image of crowded street with blurred faces representing developments for big data in the privacy and data protection laws in South Korea
Data PrivacyInsights

Recent Changes to Privacy and Data Protection Laws in South Korea

October 18, 2016
In June 2016 the Korean government announced new guidelines on personal data de-identification measures which have contributed to a greater clarity around the use and transfer of personal data for purposes other than those consented to by the data subject. How will they positively impact the big data market?
Read More
Image of participants at Data Privacy Asia 2015 with the theme to Establish an Ecosystem of Trust and Protection in the Digital Age
Data PrivacyInsights

Get Ready to Establish an Ecosystem of Trust and Protection in the Digital Age

October 18, 2016
The Data Privacy Asia 2016 Conference will feature top ranked industry experts from more than 15 countries and a more interactive audience experience than ever before. The Conference, which is themed Building Digital Trust: Establishing an Ecosystem of Trust and Protection in the Digital Age will examine subjects like trust vs. innovation and privacy vs. security, how enterprises can meet the challenges of a globally diverse regulatory and compliance landscape, and the privacy challenges on IT and security.
Read More
Image of engineer drawing plans on a wall representing the use of ISACA's privacy principles to develop an effective privacy program
Data PrivacyResources

eBook: Using ISACA’s Privacy Principles to Create an Effective Privacy Program

October 18, 2016
To help information security, privacy and compliance professionals architect and implement the best security and privacy practices for your organization, Rebecca Herold, lead developer and author of ISACA's Privacy Principles and Program Management Guide, provides an overview of the 14 principles and explain the importance for each business, in any country, to implement them within their own organizations.
Read More
Image of engineer drawing plans on a wall representing the use of ISACA's privacy principles to develop an effective privacy program
Data PrivacyResources

Webinar: Using ISACA’s Privacy Principles to Create an Effective Privacy Program

September 22, 2016
To help information security, privacy and compliance professionals architect and implement the best security and privacy practices for your organization, Rebecca Herold, lead developer and author of ISACA's Privacy Principles and Program Management Guide, provides an overview of the 14 principles and explain the importance for each business, in any country, to implement them within their own organizations.
Read More
Image of man using tablet with lock symbol representing the design and implementation on online privacy policies in Thailand
Data PrivacyInsights

Online Privacy Policies in Thailand: Designing and Implementing an Effective Policy

September 21, 2016
Data privacy has long been an issue of public concern, and with changes in online technology, the problem has only deepened. From a legal perspective, a website’s privacy policy essentially functions as an agreement with a site’s users in which the operator seeks consent or agreement from the users to collect and process their personal information. The privacy policy also informs users of the specific type of information the site collects, and how this information will be utilised, processed or shared with third parties.
Read More
Image of shield against digital backdrop representing the adoption and legal challenge of the EU-US Privacy Shield
Data PrivacyInsights

EU-US Privacy Shield Adopted but Likely to Face Legal Challenge

August 26, 2016
Improvements to the first Privacy Shield include better data retention provisions and independent Ombudsman, but Data Protection Authorities still cautious.
Read More
Image of man pressing buttons on desk phone representing the recent U.S. vs Apple case
Data PrivacyInsights

The Recent US v. Apple Case in Context (Part IV)

August 26, 2016
In this, the final instalment in the series, Pauline C. Reich, Professor and Director of the Asia-Pacific Cyberlaw, Cybercrime and Internet Security Research Institute at the Waseda University School of Law in Tokyo, Japan examines the implications of the recent US v. Apple case in terms of disclosure requirements in Asia and across the globe.
Read More
Image of call center agent with a headset representing the issues for direct marketing in Hong Kong
Data PrivacyInsights

Direct Marketing in Hong Kong: A Summary of Key Privacy Issues

July 23, 2016
The use and disclosure of personal data for direct marketing purposes is strictly regulated in Hong Kong with more severe consequences for non-compliance than other breaches of Hong Kong privacy law, and is often found to be significantly more onerous than in other jurisdictions. This article summarises some of the key elements of Hong Kong’s direct marketing regime.
Read More
1 … 72 73 74 75 76

Latest

Cisco logo on a wall showing network breach due to voice phishing and MFA fatigue

Cisco Network Breach Traced Back To Compromised Personal Google Account; Sophisticated Attacker Used Combination of Voice Phishing and MFA Fatigue

Empty control center showing cybersecurity workforce gap and DevSecOps divide

Stop Fretting About Hiring Security Specialists

Digital pictures on blurry dark background showing FTC rules on consumer data and commercial surveillance

Proposed FTC Rules Address Commercial Surveillance, Represent Seismic Shift in Handling of Consumer Data

Man using magnifying glass showing SOC 2 for data protection

Want To Turn Your Data Protection Practices Into a Competitive Advantage? Get SOC 2 Compliant

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results