CategoryAll|Guest Blogger|Privacy Basics|Privacy Ref

Lessons Learned (or Not) From the Target Breach

My shopping list was eclectic: a birthday toy for my nephew, shampoo, dog food, and some holiday themed hand towels.  I needed to make the most of my time and budget during this particularly hurried time of the year.  The most logical answer?  Yes, you guessed it.  Target.   As  much as I wanted ...

“Their Office Is Down the Hall”

A number of years ago, I sat in a conference room, slacked jawed, at a response given by a senior manager from an Information Technology team to a federal examiner.  The examiner, in an ad-hoc discussion about organizational structure and process, simply queried about the risk management processe...

Is your organization prepared for a data breach?

Most companies have a crisis communication plan stashed somewhere. Whether it’s policies and procedures reviewed monthly or updated on a yearly basis, companies must prepare for worst-case scenarios. But has your company prepared for a data breach; when your customer’s private and financial infor...

Wearable Recording Devices and Invasion of Privacy

Wearable recording technologies will prove enormously useful in many circumstances. Their use is not inherently incompatible with personal privacy. Nevertheless, they will make possible eavesdropping and common-law invasions of privacy on an unprecedented scale, to the point where these technolog...

Crisis Communication Plans and Data Breaches

Think of a data breach as not only a possibility, but also a likely crisis scenario for your company. A breach will cost your company not only money but can deeply damage its reputation. When was the last time your company reviewed its crisis communication scenarios and, most importantly, added d...