Privacy

The Role of Privacy Practices in Information Management

Tracy Mitrano and Jacob Cunningham, EDUCAUSE,  Tuesday, February 10, 2015

Cloud computing shifts the institutional burden from technology to contract formation. Nowhere is this shift more notable than in information management. Many privacy practices and technical security controls must be negotiated up front with the vendor. Physical technology rests on their premises while the institution's regulatory, business needs, and ethical responsibilities to maintain the information appropriately do not change.

Limit ‘Right to Be Forgotten’ to Europe, Panel Tells Google

Mark Scott, New York Times Bits,  Friday, February 06, 2015

Europe’s so-called right to be forgotten should apply only in Europe. That was the majority opinion in a recommendation published on Friday by an eight-person committee set up by Google to provide guidance over how the search giant should comply with a landmark privacy ruling in the 28-member bloc.

Congress takes another swing at ending warrantless reading of emails

John Ribeiro, IDG News Service,  Thursday, February 05, 2015

Legislation that aims to put a stop to warrantless reading of emails got a fillip Wednesday with bills introduced both in the U.S. Senate and the House of Representatives to amend the Electronic Communications Privacy Act. The bipartisan "Electronic Communications Privacy Act Amendments Act of 2015" will require the government to have a search warrant to obtain the content of Americans' emails and other electronic communications stored with a third-party service provider, even if it is older than 180 days. It will also require that the government notify the person whose account was disclosed, and provide him with a copy of the search warrant and other details about the information obtained.

Getting Smart about Smartphones

Julie Anderson by Julie Anderson, AG Strategy Group
Wednesday, February 04, 2015

If the 20th century was the age of the automobile, the 21st already looks to be the century of smartphones, devices and big data. In the past five years alone, smartphones have gone from being reserved for the world’s wealthiest to full integration into our daily lives. But as next-generation technologies such as Apple’s Siri, Google Voice, smart watches, and other interactive, data-collecting tools are adopted faster than any previous technology in human history, this begs the question—how much do consumers actually know about them? And what can we, as consumers, do to protect our personal data from misuse?

FTC’s Rich Lays a Roadmap for Responsible Data Practices

Omer Tene, IAPP,  Tuesday, February 03, 2015

If you haven’t already read the speech that Federal Trade Commission (FTC) Bureau of Consumer Protection (BCP) Director Jessica Rich gave last week at an advertising industry meeting, take the time to do it now. Direct, sharp and concise, it maps out the state of play at the intersection of technology, law and policy, and charts a path for businesses that wish to avoid legal trouble not only with the powerful federal regulator but also with state attorneys general, class-action plaintiffs and European privacy authorities.

Google to change privacy policy after investigation by UK data watchdog

Leila Abboud, Reuters,  Friday, January 30, 2015

Search engine Google has agreed to better inform users about how it handles their personal information after an investigation by Britain's data protection regulator found its privacy policy was too vague. The Information Commissioner's Office (ICO) said in a statement on Friday that it required Google to sign a "formal undertaking" that it would make the changes by June 30 and take further steps in the next two years.

FTC Recommends Limits on Data Collection Via Internet of Things

Elizabeth Dwoskin, Wall Street Journal,  Tuesday, January 27, 2015

In a much-anticipated report on the so-called-Internet of Things, the Federal Trade Commission laid out on Tuesday steps businesses can take to protect consumers’ privacy. The first is to build security into devices at the outset, rather than as an afterthought. Other recommendations include: vetting partners for how they handle consumer data, taking measures to keep unauthorized users from accessing personal information stored on the network, and monitoring and patching connected devices throughout their expected life cycle.

OTA Releases Guidelines On Privacy Assessment, Best Practices

Laurie Sullivan, Media Post,  Friday, January 23, 2015

Dependency on cloud computing, outsourcing requirements and interconnected devices will eventually force the advertising industry to follow comprehensive security controls and practices to reduce the risk of data breaches. More than 90% of the 500 data breaches that occurred from January to June 2014 could have easily been prevented, per a report released Wednesday from The Online Trust Alliance (OTA).

Signing the Pledge

Tracy Mitrano, Inside Higher Ed,  Tuesday, January 20, 2015

On Friday, we learned that Google quietly signed the Student Privacy Pledge – almost a week after President Obama called them out by name to ask why not. That is a good thing. Why did it take so long? Hubris first. Google thinks itself above association with other companies when such association is not intrinsically within its business interest. Joining the Pledge when it was first announced three months ago would have seemed unseemly.

Safety, Privacy, and the Internet Paradox: Solutions at Hand and the Need for new Trans-Atlantic Rules

Microsoft Europe,  Tuesday, January 20, 2015

Today at the Center for European Policy Studies, Brad Smith, general counsel and executive vice president, legal and corporate affairs, Microsoft, delivered remarks and participated in a panel discussion on the subject of Trust, data and national sovereignty: solutions for a connected world.