Privacy Ref Blog by Tag

Tag "Customer Service" returned 13 posts


Does your call center share too much personal information?

If you have done business with a company and reach out to their call center, how do they authenticate who you are? Do they ask you for personal information or ask you to verify personal information? Continue reading this post…

Posted on July 17, 2014 by Bob Siegel - No Comments
Tags: , , , ;

 


Valuable functionality can cause a privacy breach

Last Friday it was revealed that reporters from Bloomberg News could retrieve information from the profiles of subscribers to Bloomberg’s data terminals as well as the subscribers’ system usage (NYT article here). While I agree with the characterization of this incident as a “mistake”, wasn’t this really a violation of basic privacy principles?
Continue reading this post…

Posted on May 12, 2013 by Bob Siegel - No Comments
Tags: , , , , , ;

 


Emerging technology, privacy, and your business

Google Glass has sparked a wide ranging discussion about the product’s potential  impact on privacy. The conversations I have seen have mostly focused on the impact to the existence of privacy in our technology-dependent world, but I have seen only limited discussion on the impact to a business. It would be nice for businesses to be proactive in considering policies for emerging  technology instead of reacting as things evolve. Continue reading this post…

Posted on March 24, 2013 by Bob Siegel - No Comments
Tags: , , , ;

 


Fingerprints, privacy notice, and theme parks

My wife and I recently visited a major theme park and were surprised that our fingerprints were requested when we entered. While I understand the good business reason the fingerprints were requested, I remain dumbfounded why I could not find a privacy notice that disclosed how the information was being protected.
Continue reading this post…

Posted on March 10, 2013 by Bob Siegel - No Comments
Tags: , , ;

 


Privacy observations while waiting for a memory upgrade

Deciding I needed a memory upgrade for my laptop, I went to the nearest Best Buy on the advice of another retailer. Things got a little complicated allowing me to spend about two and a half hours in the store. This gave me a chance  me to see how this particular Geek Squad protected privacy. My experience with privacy and the Geek Squad had been very positive at another location, but this experience left some things to be desired.

Continue reading this post…

Posted on February 17, 2013 by Bob Siegel - No Comments
Tags: , , ;

 


SMB privacy: no free pass

Like larger enterprises, small and medium businesses (SMBs) collect personal information about their customers, employees, vendors and other stakeholders; it is just part of doing business. Establishing an SMB privacy program would be very beneficial for these businesses, but for the majority of SMBs the thought of protecting personal information is not a priority. At least one recent survey  found that over 70% of the SMBs questioned did not realize they had regulatory obligations to protect personal information.
Continue reading this post…

Posted on January 12, 2013 by Bob Siegel - No Comments
Tags: , , , , , ;

 


Personal Information From Above

As a child growing up in New York City I always wanted to go to the Macy’s Thanksgiving Day Parade. The floats, the balloons, the clowns, the celebrities, the marching bands, the scraps of personal information….wait…personal information?
Continue reading this post…

Posted on December 3, 2012 by Bob Siegel - No Comments
Tags: , , , , ;

 


Two reactions from customers to a data breach

TD Bank has notified their customers of a data breach through the  loss of a backup tape. Initial reports have said that the tapes contain  the account information and Social Security numbers of more than 267,000 customers on the US East Coast. The tape was not encrypted so, while the bank is unaware of any misuse of the information, anyone who does obtain the tape could easily read the information it contains.

I was with some TD Bank customers the day the data breach was acknowledged. There were two comments made that I hear anytime a breach occurs so I wanted to share them to help you protect your brand image in the event of a data loss.
Continue reading this post…

Posted on October 16, 2012 by Bob Siegel - No Comments
Tags: , , , ;

 


Your staff needs to be “privacy aware”

When it is all said and done, no matter what policies you put in place, no mater what procedures you define, no matter what documentation has been written to support your privacy program, it is worthless unless your organization’s staff is knows that these tools exist making them “privacy aware”. Here are a couple of horror stories:
Continue reading this post…

Posted on September 24, 2012 by Bob Siegel - No Comments
Tags: , , ;

 


Facial recognition, familiarity, and the creepiness factor

Several weeks ago there were a number of articles on  British Airways googling their VIP passengers before boarding a flight. This practice allowed BA to step up their  level of customer service including recognizing these people by name as they arrived. BA could also gather all sorts of personal information about these customers so “creepy alarms” went off.
Continue reading this post…

Posted on August 20, 2012 by Bob Siegel - 1 Comment
Tags: , , , , ;

 


Next Page »

Subscribe to our mailing list

Please fill out the form below.

Required

Want to find out more?

Simply go to the contact page, fill out the form, and someone from Privacy Ref will be in touch with you. You can also send an email to info@privacyref.com or call (888) 470-1528.

News

May 10, 2017

Predictive Breach Cost Model
Download our predictive breach cost modelhere.

Latest Blog Posts

October 30, 2017

PSR 2017 in Review
After a long trip from the northeast to San Diego, I finally made it to another exciting Privacy, Security, and Risk Conference from the IAPP. With GDPR on the horizon, the air was thick with discussion of this regulation in effect in May of next year. Even more so, a lot of questions received at the Privacy Ref booth were focused on this law, or preparing a privacy program through assessments data mapping. Overall, a great show with a few major themes. Continue reading this post...

The key to effective privacy training
I spend a lot of time facilitating privacy training. Whether it is directly for our clients or on behalf of the IAPP or their training partners, there are common elements to a successful educational event. Continue reading this post...

Other Recent Posts

PRIVACY REF