Data Security Data Collection

News & Analysis as of

How Data Scientists & Compliance Can Work Together Better; Keith Furst Explains [PODCAST]

Data scientist Keith Furst and Masters of Disaster® podcast host Leona Lewis discuss how data scientists and compliance can collaborate better to get compliance the data it needs. It is almost impossible to have one...more

Companies That Collect Sensitive Consumer Data Should Note the FTC’s LabMD Ruling

The FTC has been a leader in enforcing cybersecurity issues in recent years, and just last week it issued a highly-anticipated decision on its authority to regulate cybersecurity as a form of unfair consumer practice under...more

Unlocking the EU General Data Protection Regulation: A practical handbook on the EU's new data protection law: Chapter 6: Data...

Why does this topic matter to organisations? The Data Protection Principles provide the conditions on which an organisation is permitted to process personal data. If an organisation cannot satisfy the Data Protection...more

FinTech Companies Face Big Privacy Challenges in 2016

According to the FBI, “there are only two types of companies: those that have been hacked and those that will be.” It does not take an actual data breach, however, for a company to be liable for its data security practices. ...more

Does Your Organization Collect Geo-Location Information?

Smartphones, smartphone apps, websites, and other connected devices (e.g., “wearables”) increasingly request that consumers provide their geo-location information. Geo-location information can refer to general information...more

Best Practices For Implementing Internal Security Controls

Many security risks can be avoided or mitigated by implementing sufficient internal security controls which are tailored to the organization’s size, needs, and specific industry. The Federal Trade Commission (“FTC”) sets...more

Colorado Student Data Privacy Bill – What EdTech software providers need to know

Colorado is the latest state to revisit, and expand upon, its laws pertaining to the use and protection of student data. Colorado Governor John Hickenlooper recently signed into law House Bill 16-1423 (the “Bill”) designed to...more

White House Finalizes Data Security Framework For Precision Medicine Initiative

On May 25, 2016, the White House unveiled the final data security framework for its Precision Medicine Initiative (“PMI”). One of the main goals of PMI is to develop a research cohort for collecting health data from...more

Proposed amendment to Illinois biometrics privacy law introduced then stalled

On May 26, 2016, Illinois Senator Terry Link filed a proposed amendment to the Illinois Biometric Information Privacy Act that would presumably ease the rules relating to the collection and use of biometric data. What irked...more

How to Design a Document Retention Policy

Data minimization can be a powerful – and seemingly simple – data security measure. The term refers to retaining the least amount of personal information necessary in order for an organization to function. Less information...more

Alert: The FCC Proposes New Internet Privacy and Data Security Rules

At its March 31, 2016 open meeting, the FCC adopted a notice seeking comment on privacy rules for Internet service providers (ISPs). The rules would govern how ISPs can collect and use information about their customers'...more

Baby You Can Drive My Car

Consumers can expect many benefits from their cars’ increased data collection programs, running the gamut from simple location services like GPS and OnStar to “networked” cars that can communicate their location with other...more

FTC’s PrivacyCon Highlights Consumer Privacy Perceptions and Targeting

The Federal Trade Commission is currently the most aggressive enforcement agency on privacy and data security. The agency kicked off 2016 with PrivacyCon on January 14, which put the spotlight on academic research on consumer...more

International Data Privacy: How to Navigate the Challenges

Hardly a day goes by when the news doesn't include some privacy-related story or scandal. To name just a few recent examples, we've seen: ..Highly publicized losses of customer credit card data by household-name...more

How to Conduct a Data Inventory

Knowing the type of data that you collect, where it is being held, with whom it is being shared, and how it is being transferred is a central component of most data privacy and data security programs. The process of answering...more

Federal Trade Commission PrivacyCon 2016 Recap: Insights into the FTC’s Perspective on Privacy and Data Security

The Federal Trade Commission’s PrivacyCon event brings together the FTC, researchers and academics to discuss the latest research and trends related to consumer privacy and data security. Much of the discussion today...more

Long and Wyndham Road: The Federal Trade Commission Extends Section 5 Unfairness to Regulate Data Security

In a surprising development, Wyndham Worldwide Corporation settled a long running dispute last week with the Federal Trade Commission that arose from three data breaches Wyndham suffered between 2008-2010. After an...more

NAIC Cybersecurity Task Force Adopts Cybersecurity Bill of Rights

On October 14, 2015, the National Association of Insurance Commissioners’ (NAIC) Cybersecurity Task Force adopted the Cybersecurity Bill of Rights, a document meant to inform consumers of the services they can expect from...more

San Francisco Launches First “Internet of Things” Wireless Network in United States

With the onslaught of smart watches, smart thermostats, and even smart refrigerators that allow you to Tweet hungry messages to your followers, it’s only natural that a “smart city” would follow. This week, San...more

Three Trending Topics in IoT: Privacy, Security, and Fog Computing

Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the...more

Illinois finds itself at forefront of facial-recognition litigation

Illinois is leading the way in regulating facial-recognition technology — it is one of only two states (the other Texas) that has passed laws covering the collection and use of biometric information. Illinois also is...more

5 Questions to Ensure Your Policies Keep Up With the Pace of Change

You hear a lot these days about the ways that individuals’ private data is collected and potentially exposed—to technology companies, employers, the government and so on. You hear less about the concern of many employers, who...more

Could a Vendor’s Lax Info Security Ruin Your Holiday Sales? Seven Preventative Steps for Retailers

Many of the largest retailer data security breaches have been caused or enabled by the acts or omissions of retailers’ vendors, such as the widely publicized incident at Target Corporation. Several such breaches occurred...more

Tagging Trouble: Forays into the Regulation of Biometric Data

We leave breadcrumbs of biometric information scattered around our daily lives, which may be collected and used by private entities, often without our knowledge or consent. The sound of your voice when you call your bank’s...more

FTC Sees Disconnect on Proposed Connected Cars Legislation

The Energy & Commerce Committee of the U.S. House of Representatives held a hearing on October 21st titled “Examining Ways to Improve Vehicle and Roadway Safety” to consider (among other matters) Vehicle Data Privacy...more

61 Results
|
View per page
Page: of 3
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×