Privacy Ref Blog

Facebook and Trust

I have previously written about the importance of a privacy program to in part, manage trust between an organization and its customers. As more data breaches occur and privacy is made more of an issue that is embraced and examined by the general public, this trust will become more important. One example of this is the evolving situation at Facebook.

Continue reading this post…

Posted on April 10, 2018 by Ben Siegel - No Comments

 


Is Your Response Plan Responsive Enough?

So, you have a formal data breach response plan in place or an informal plan of action in mind….now what?  With Alabama and South Dakota in a race to become the 49th state to enact data breach notification legislation (for sure, no one wants to be the “last man standing” in this scenario!), it may be a good time to review your plan.  Continue reading this post…

Posted on April 9, 2018 by Guest Author - No Comments

 


Using GDPR as a framework for your privacy program (even if you are not in scope)

The privacy landscape shifts, it seems, every week. The changes may come from new laws or regulations, changes in public opinion, expansion (or contraction) of your business, or the introduction of new technology to your infrastructure. Throughout this turmoil you need to have a privacy program that is resilient, adaptable, and agile so it can take the buffeting from these shifts while continuing to provide guidance to your organization. Continue reading this post…

Posted on March 23, 2018 by Bob Siegel - No Comments

 


Looking forward to the IAPP Global Privacy Summit

It’s that time of year again; time for the IAPP’s Global Privacy Summit. Yes, I pack up this weekend to head to Washington, DC for training, seminars and, of course, networking. Continue reading this post…

Posted on March 17, 2018 by Bob Siegel - No Comments

 


Do It Your Self Rights Requests

On our last webinar (as of this writing) I discussed how a company can handle data subject’s rights requests under GDPR. Many of these requests are going to require attention, such as those ‘right to be forgotten’ requests. Others may seem daunting but can be handled easily and may not require any direct participation from your end. Continue reading this post…

Posted on March 8, 2018 by Ben Siegel - No Comments

 


Define Maturity Then Your Metrics

Security metrics are somewhat of an enigma.  Executives want something tangible to speak to and analyze yet they are not easy to define or measure.  Most likely you will hear examples such as ‘number of laptops stolen’ or ‘number of servers with known vulnerabilities’, but what do those numbers mean? Why do we or should we care about them? Yes, they will help to indicate areas of risk or improvement, possible ROI, but before you start the never-ending process of defining security metrics, it is beneficial to understand your organization’s security level of maturity by utilizing CMMI maturity levels.

Continue reading this post…

Posted on March 6, 2018 by Jen Spencer - No Comments

 


Trump, Oliver, and Objection

Let me begin by saying that the following text is intentionally ridiculous. I want to illustrate a point recently made about the upcoming E-Privacy Regulation, specifically related to direct marketing.

Imagine one day, President Trump is in France for a summit to discuss some topic of relevance to the international community. He grabs a diet coke and heads over to his monitor to watch a stream of his favorite informative news on Fox & Friends. Little does he know that lying in wait for him is a piece of targeted marketing specifically aimed towards him.

Continue reading this post…

Posted on February 12, 2018 by Ben Siegel - No Comments

 


Delivering Security and Privacy Designed for Today’s Threats

by Keri LeBlanc, Marketing Director, CyberDenfenses, Inc.

Founded in 2001 by military cybersecurity veterans, CyberDefenses works closely with enterprise clients to provide battle-tested managed security services. If there is anything we’ve learned over the years, it’s that effectively protecting your organization’s critical data from increasingly capable and determined adversaries requires a combination of trained people, well-designed processes, and modern tools. That’s why CyberDefenses’ approach encompasses a full suite of services, training and advisory guidance.

Continue reading this post…

Posted on by Guest Author - No Comments

 


Do I need cyber insurance?

If you are going to store, access, process and/or transmit any critical or sensitive information on behalf of your organization or a third party then cyber insurance may be recommended. Continue reading this post…

Posted on February 9, 2018 by Jen Spencer - No Comments

 


GDPR, the right to erasure, and backups

As we work with clients to prepare them for GDPR we deeply dive into data subjects’ rights. When we cover the right to erasure, the same question comes up, “what about backups?”

Continue reading this post…

Posted on February 3, 2018 by Bob Siegel - No Comments

 


Next Page »

Subscribe to our mailing list

Please fill out the form below.

Required

Want to find out more?

Simply go to the contact page, fill out the form, and someone from Privacy Ref will be in touch with you. You can also send an email to info@privacyref.com or call (888) 470-1528.

News

April 16, 2018

IAPP Training Classes
Privacy Ref is proud to announce that we are an official training partner of the IAPP. You now have the opportunity to learn from one of our knowledgeable privacy professionals using the most respected training content in the industry. The robust interactive training offered, aids in the understanding of critical privacy concepts. The contents of the courses are integral to obtaining your privacy certifications and to educate your new team. Learn more here.

Latest Blog Posts

April 10, 2018

Facebook and Trust
I have previously written about the importance of a privacy program to in part, manage trust between an organization and its customers. As more data breaches occur and privacy is made more of an issue that is embraced and examined by the general public, this trust will become more important. One example of this is the evolving situation at Facebook. Continue reading this post...

April 9, 2018

Is Your Response Plan Responsive Enough?
So, you have a formal data breach response plan in place or an informal plan of action in mind....now what?  With Alabama and South Dakota in a race to become the 49th state to enact data breach notification legislation (for sure, no one wants to be the “last man standing” in this scenario!), it may be a good time to review your plan.  Continue reading this post...

Other Recent Posts

PRIVACY REF