Tracy Mitrano and Jacob Cunningham, EDUCAUSE, Tuesday, February 10, 2015
Cloud computing shifts the institutional burden from technology to contract formation. Nowhere is this shift more notable than in information management. Many privacy practices and technical security controls must be negotiated up front with the vendor. Physical technology rests on their premises while the institution's regulatory, business needs, and ethical responsibilities to maintain the information appropriately do not change.
Mark Scott, New York Times Bits, Friday, February 06, 2015
Europe’s so-called right to be forgotten should apply only in Europe. That was the majority opinion in a recommendation published on Friday by an eight-person committee set up by Google to provide guidance over how the search giant should comply with a landmark privacy ruling in the 28-member bloc.
John Ribeiro, IDG News Service, Thursday, February 05, 2015
Legislation that aims to put a stop to warrantless reading of emails got a fillip Wednesday with bills introduced both in the U.S. Senate and the House of Representatives to amend the Electronic Communications Privacy Act. The bipartisan "Electronic Communications Privacy Act Amendments Act of 2015" will require the government to have a search warrant to obtain the content of Americans' emails and other electronic communications stored with a third-party service provider, even if it is older than 180 days. It will also require that the government notify the person whose account was disclosed, and provide him with a copy of the search warrant and other details about the information obtained.
AG Strategy Group
Wednesday, February 04, 2015
If the 20th century was the age of the automobile, the 21st already looks to be the century of smartphones, devices and big data. In the past five years alone, smartphones have gone from being reserved for the world’s wealthiest to full integration into our daily lives. But as next-generation technologies such as Apple’s Siri, Google Voice, smart watches, and other interactive, data-collecting tools are adopted faster than any previous technology in human history, this begs the question—how much do consumers actually know about them? And what can we, as consumers, do to protect our personal data from misuse?
Omer Tene, IAPP, Tuesday, February 03, 2015
If you haven’t already read the speech that Federal Trade Commission (FTC) Bureau of Consumer Protection (BCP) Director Jessica Rich gave last week at an advertising industry meeting, take the time to do it now. Direct, sharp and concise, it maps out the state of play at the intersection of technology, law and policy, and charts a path for businesses that wish to avoid legal trouble not only with the powerful federal regulator but also with state attorneys general, class-action plaintiffs and European privacy authorities.
Leila Abboud, Reuters, Friday, January 30, 2015
Elizabeth Dwoskin, Wall Street Journal, Tuesday, January 27, 2015
In a much-anticipated report on the so-called-Internet of Things, the Federal Trade Commission laid out on Tuesday steps businesses can take to protect consumers’ privacy. The first is to build security into devices at the outset, rather than as an afterthought. Other recommendations include: vetting partners for how they handle consumer data, taking measures to keep unauthorized users from accessing personal information stored on the network, and monitoring and patching connected devices throughout their expected life cycle.
Laurie Sullivan, Media Post, Friday, January 23, 2015
Dependency on cloud computing, outsourcing requirements and interconnected devices will eventually force the advertising industry to follow comprehensive security controls and practices to reduce the risk of data breaches. More than 90% of the 500 data breaches that occurred from January to June 2014 could have easily been prevented, per a report released Wednesday from The Online Trust Alliance (OTA).
Tracy Mitrano, Inside Higher Ed, Tuesday, January 20, 2015
On Friday, we learned that Google quietly signed the Student Privacy Pledge – almost a week after President Obama called them out by name to ask why not. That is a good thing. Why did it take so long? Hubris first. Google thinks itself above association with other companies when such association is not intrinsically within its business interest. Joining the Pledge when it was first announced three months ago would have seemed unseemly.
Safety, Privacy, and the Internet Paradox: Solutions at Hand and the Need for new Trans-Atlantic Rules
Microsoft Europe, Tuesday, January 20, 2015
Today at the Center for European Policy Studies, Brad Smith, general counsel and executive vice president, legal and corporate affairs, Microsoft, delivered remarks and participated in a panel discussion on the subject of Trust, data and national sovereignty: solutions for a connected world.