All Privacy & Technology articles – Page 12
-
Article
WhatsApp’s “Delete for Everyone” doesn’t work for iPhone users
Application security consultant, Shitesh Sachan, has warned that the “Delete for Everyone” WhatsApp feature doesn’t work on iPhone devices.
-
News
UN entities “not subject to the GDPR”
UNICEF, the United Nations children’s agency has said it may have caused a data breach to reveal the private information of thousands of online learners through the Agora platform.
-
Feature
Why anonymisation does not work for big data
Recently, well-publicised research by data scientists at Imperial College in London and Université Catholique de Louvain in Belgium as well as a ruling by Judge Michal Agmon-Gonen of the Tel Aviv District Court have highlighted the shortcomings of outdated data protection techniques like “Anonymisation” in today’s big data world.
-
Podcast
Tash Whitaker discusses the Ever-Changing Faces of Anonymity
Hear from Tash Whitaker, leading data protection voice and experienced privacy consultant as she discusses the ever-changing faces of anonymity.
-
Podcast
Abigail Dubniecki & Gilbert Hill discuss Privacy-by-Design
Listen to hear from Abigail Dubniecki, a lawyer and founder of Strategic Compliance Consulting and Gilbert Hill, data expert and Founder of Tap My Data as they join together to discuss Privacy-by-Design and Emerging Technologies in Privacy.
-
Article
Office 365 banned in German state schools due to privacy worries
Schools in Hesse, Germany will stop using Microsoft Office 365 because of a cyber-security risk which could lead to violation of the General Data Protection Regulation (GDPR).
-
Podcast
Joe Dignan: IoT & Smart City Expert
In this episode, hear from the Founder of Kintechy - Joe Digman, as he discusses the Internet of Things and Smart Cities.
-
Feature
The importance of consent and privacy when deploying voice biometrics
In a recent discussion with an acquaintance the following question was posed; would it bother you if a biometric template of yourself, any biometric at all, was stored by a third-party, be that a bank, healthcare provider, government agency or any other responsible entity?
-
Feature
The importance of securing customer data over the phone
Ensuring the safety of customers’ financial data is a priority in an era of ever-tighter regulations and increasing pressure. Breaches of credit card details, passwords or bank account information have sadly been a common occurrence in recent years – 2018 alone saw several major airline companies suffer cyber-attacks leading to thousands of customers falling victim to the theft of their financial details.
-
News
Verification.io suffers major data breach
Email platform, Verification.io has suffered a major data breach that has compromised around 2 billion records, reports reveal.
-
Feature
What does ERP have to do with GDPR?
Getting company and customer data in order can seem like a daunting task, especially for those leaving it to the last minute. Up until last May, data protection laws haven’t changed much since the 90s, which is surprising given how much has changed with regard to our digital identities. From social media, to mailing lists, to the Internet of Things, many of us are leaving trails of our digital identity wherever we go.
-
Article
More privacy concerns hit Twitter
User privacy on Twitter has returned to the headlines following two patches that the social media platform had to implement to address glitches in its security systems.
-
Feature
Secure data sharing: How to reduce compliance risks
Making consumer and sensitive data more secure has been top of the agenda for business leaders and managers in a wide range of sectors since GDPR was announced.
-
Feature
Cambridge Analytica and Facebook: surviving the mindset revolution
I bet you never thought taking one of those innocuous Facebook quizzes would lead to the election of Donald Trump?
-
Feature
The 7 elements of GDPR software security compliance
By now, you’re probably aware that the General Data Protection Regulation (GDPR) is coming. Taking effect on May 25, 2018, GDPR aims to unify the European Union (EU) on common data protection practices. Bringing more control and higher standards, this regulation will affect how firms gather, store, and use data pertaining to EU residents.
-
Feature
The impact of GDPR on the technology sector
According to report by PORT.im, the majority of UK companies are still unaware of their responsibilities when it comes to the protection of personal identifiable information under GDPR and the technology sector is no different.
-
Feature
Don’t let your cache be your GDPR weak point
Every system has its weak point. Remember when Luke Skywalker bulls-eyed a small thermal exhaust port with proton torpedos, causing a chain reaction that blew up the Death Star? Okay, it’s an extreme (and fictitious) example. However it reminds us that we must be vigilant about protecting small parts of our IT infrastructure, including the cache.
-
Q&A
How does a data controller differ from a data protection officer?
GDPR has been on the horizon for some time now and most business owners are generally familiar with the overarching principles and terminology behind the regulations, which will be enforced on 25th May 2018. But there remains some confusion over the finer details, particularly regarding data controllers and data protection officers (DPOs) and their remits.