\\Communicating privacy practices to users of mobile apps can be challenging, especially given small screen sizes and the difficulty of capturing app user attention.
Big data breaches are on the rise. That’s not news. For the past several years, headlines have been dominated with company after company suffering from some sort of cyber-security attack.
Technology Neutrality in Internet, Telecoms and European Data Protection Regulation: What It All Means
Technology neutrality is one of the key principles of the European regulatory framework for electronic communications.
Last week proved to be an important week for privacy and data protection in the US: while representatives of the European Commission were negotiating with US representatives on government surveillance and the extension of the US Privacy Act to EU citizens, the US Alliance of Automobile Manufacturers (‘Alliance’) together with the US Association of Global Automakers (‘Association’) published their ‘Consumer Privacy Protection Principles’ (‘Principles’) on 12 November 2014.
Since September, when Thomas Eric Duncan was first admitted to a hospital, Ebola-fever spread throughout the nation. Not the actual virus, although it did get passed along to eight more people, but the fear. Advice was shared, lawsuits threatened, and jobs lost. Many folks also noticed that the names and information of many of the Ebola victims were finding their way to the media, leaving many wondering if a HIPAA violation had been made.
Many of us have likely received a notification from our bank or credit card company concerning suspected fraud or improper charges.
With the rise of the global economy and the reach of the Internet, many businesses now have customers and data from around the world, if not offices and employees in numerous countries.
Earlier this week, the FTC notified Verizon by letter that it has closed its investigation into whether Verizon violated Section 5 of the FTC Act by failing to secure certain routers supplied to the company’s broadband subscribers.
According to a November 13, 2014 article in the New York Times (based on a review by the Department of Homeland Security), an intruder was able to enter the White House back in September due to a succession of performance, organizational, and technical failures.
One of the challenges facing regulators around the world as they craft rules to govern the Internet of Things is that traditional industry silos that were the basis for past legislation may no longer apply.