It’s probably just my age, but it feels like we are living in a time of rapid technological advancement. Things are changing so fast in the world of mobile, social and the sharing economy that it can be difficult for an old codger like me to keep up. Well, if you think it’s hard for an individual to stay current, how must it be for governments? It must be like a game of legislative whack-a-mole….

continue reading »

Have you visited TripAdvisor recently? If so, you’ll know that whenever you browse a hotel, or travel to a city, TripAdvisor frequently follows that up with recommendations on other hotels nearby. And reminds you again the next day. And sometimes the next. You don’t remember asking TripAdvisor for this service—but you receive it nonetheless. Is this convenience or intrusion? Many see it as interference. There is a gathering sense of unease among many people that…

continue reading »

Snapchat last year agreed to settle charges that it deceived consumers with promises about the disappearing nature of messages sent through the popular mobile messaging app. The company allegedly deceived consumers over the amount of personal data it collected and the security measures taken to protect that data from disclosure. In fact, Snapchat’s failure to secure its Find Friends feature resulted in a security breach that enabled attackers to compile a database of 4.6 million…

continue reading »

How much is your digital identity worth? It’s a question we should all be asking ourselves. Digital identity is so much more than just your user name and password. It combines data on who we are, our history, our interests and our preferences. Put all of these attributes together and a remarkably accurate and traceable picture appears of how we live, work and socialize. That identity data is one of the greatest assets any organization…

continue reading »

It’s the equivalent of leaving your front door open, and a stranger walking around your house checking through your drawers, opening your mail and reading your private diary. It’s the downside of all the data that surrounds us: a lack of data privacy. Too often our personal data is vulnerable to breaches, hacking and misuse. And once in the public domain, that data can be used for criminal purposes, while having damaging consequences for the…

continue reading »

Privacy, when it comes to Big Data, is a two way street. We must first promise to treat data carefully and protect it, but we also must plan to act when privacy is threatened or compromised. Both strategies are important. Here are some thoughts on tactics on each side of the ball. Offense Part of protecting data privacy is not being reactive. Treating data well in the first place goes a long way toward protecting…

continue reading »

If a business wants to be successful, one of the key elements it needs to consider is data privacy. Data privacy is becoming increasingly important to users, meaning it’s imperative businesses start implementing privacy practices. In this blog I will take a look at why a privacy-first approach is good for businesses. Data privacy is also known as information privacy. Information privacy is the privacy of personal information and usually related to personal data stored on computer…

continue reading »

The privacy policy is the core element of the overall contract between your company and the prospects and customers that share their data with you. Here are three common mistakes companies make when building or examining their privacy policies. Reusing another company’s privacy policy as your own. A number of companies, especially smaller and newer businesses, think of a privacy policy as simply a checklist item on the project completion timeline for getting a website…

continue reading »

If there is information about you on the Internet, do you have the right to get it deleted? If you did something a decade, two decades ago that is still showing up in searches when people Google you, do you have the right to ask Google to stop showing it? That’s the central question of the “right to be forgotten.” The European Union (EU) has always been well ahead of other jurisdictions on the road…

continue reading »

Part of the difficulty and sensitivity of working with Human Data is protecting the privacy of the individuals that data represents. The most important principle to remember is that if you do not need to be processing personally identifiable information (PII), then don’t. When the nature of the analysis does require you to work with this type of data, it needs to be anonymized. In this piece, I will take a look at some techniques…

continue reading »
Page 1 of 3123