CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Data Practices
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Data Practices

Child holding smartphone with TikTok application showing FTC investigation over data practices
Data PrivacyNews

TikTok Data Practices Under Fire as US Lawmakers Amplify Calls for FTC Investigation

July 15, 2022
A recent leak of audio meetings in which TikTok staff appear to admit to previously undisclosed data practices has some members of Congress calling for an FTC investigation.
Read More
DuckDuckGo website close up showing privacy and transparency
Data PrivacyInsights

Privacy for the Public

June 3, 2022
The DuckDuckGo disclosure is an opportunity to reflect, for individuals and companies alike. As an individual, who defines what privacy means to you? As an organization, is your internal definition of "user privacy" consistent with what your users expect?
Read More
Social communication and networking icons showing investigation into Big Tech data practices
Data PrivacyNews

FTC Expands Its Probes Into Big Tech’s Dealings; Nine of the Biggest Must Share Detailed Information About Data Practices

December 24, 2020
The FTC is expanding its investigations into the business dealings of Big Tech. Nine of the industry's biggest names have been asked to provide the agency with information about their data practices.
Read More

Latest

Digital yuan gold coin over yuan banknotes showing PBOC privacy protection for CBDC

Privacy Protection Coming for Digital Yuan? PBOC Promises “Respect” for Personal Information

World map on a technological background showing data privacy laws and cross-border data sharing

Navigating Evolving Data Privacy Laws and Cross-Border Data Sharing

Boy using phone in bed at night showing cyber safety and end-to-end encryption

UK Government Wrestles With Balance Between Child Cyber Safety and Legitimate End-to-End Encryption Purposes as Agencies Endorse Client-Side Scanning

Cisco logo on a wall showing network breach due to voice phishing and MFA fatigue

Cisco Network Breach Traced Back To Compromised Personal Google Account; Sophisticated Attacker Used Combination of Voice Phishing and MFA Fatigue

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results