This is the FTC’s fourth case enforcing Privacy Shield. It continues the FTC’s commitment to enforcing international privacy frameworks, making a total of 47 cases enforcing the Privacy Shield, the predecessor Safe Harbor framework, and the Asia Pacific Economic Cooperation Cross Border Privacy Rules framework.
Different business stakeholders are often at odds with each other and matters are getting escalated to decision makers who had never been involved in the technically complex and largely misunderstood world of cookies.
With the signing of the California Consumer Privacy Act last week, privacy advocates and commentators are beginning to consider and comment on the potential result of this action.
The “open mic” of so many voice-assisted devices coupled with the nigh-ubiquitous network of “smart devices,” other gadgets and gizmos increasingly listening to everything said around them certainly presents opportunity for mistake – and, perhaps, hacking.
While the Apache Project has many supporting tools, such as the Nutch crawler and the Tika “filter pack,” which extend the capabilities of both Lucene or Solr, implementing a pure open source search solution takes significant effort.
One topic, however, that has gotten scant attention is what the GDPR will mean for litigators seeking discovery from Europe. Well, here is a prediction – U.S. courts will have little patience for GDPR compliance requirements if the result is a failure to preserve electronically stored information (ESI), a substantial delay in producing requested documents and data, or an outright refusal to produce the materials requested.
Recently, the Personal Data Collection and Protection Ordinance (“the Ordinance”) was introduced to the Chicago City Council.
While security (network security, IoT security, application-security) is a critical piece in privacy, privacy regulations like GDPR have additional elements like policy enforcement, monitoring, control and reporting, to flag and control a rogue IT administrator as an example, or someone internally casually looking at a customer’s private data. So a business can be secure, but still be non-GDPR compliant. And an insecure firm, is most definitely non-GDPR compliant.
The Cloud Security Alliance (CSA) today released the CSA Code of Conduct (CoC) Self-Assessment. An essential tool for those charged with General Data Privacy Requirements (GDPR) compliance, the CSA CoC Self-Assessment provides a transparent means for standardizing compliance initiatives.
Want to understand all the most important tech stats and trends? Legendary venture capitalist Mary Meeker has just released the 2018 version of her famous Internet Trends report. It covers everything from mobile to commerce to the competition between tech giants.