Privacy Ref Blog by Tag

Tag "Information protection" returned 10 posts


What is the difference between privacy and security?

One question that I am frequently asked is “what is the difference between privacy and security?” It sounds simple enough, but the response often gets complicated. Maybe an analogy will help. Continue reading this post…

Posted on May 24, 2016 by Bob Siegel - No Comments
Tags: , ;

 


Police, Body Cameras, Privacy, and Policy

In the recent past a local police officer was involved in a shooting resulting in a citizen’s death. Soon after, the cry of “if only there was a body camera we would know what happened” was heard. I agree. However any police department needs to put policies in place to protect citizens’ privacy when cameras are used. Similarly, businesses using monitoring technologies need to put policies in place as well.
Continue reading this post…

Posted on October 29, 2015 by Bob Siegel - No Comments
Tags: , , , , ;

 


Tom Brady, Joe Namath, and Privacy

Like many Americans I grew up idolizing football players, quarterbacks in particular. Joe Namath and Tom Brady are among those I have enjoyed watching play. Who would of thought that these two men who played in different eras would provide examples for a privacy discussion for business.
Continue reading this post…

Posted on August 12, 2015 by Bob Siegel - No Comments
Tags: , , , , ;

 


I (physically) lost my license

I travel frequently; about 80% of the time I find myself on the road to visit a client or speak at an event. Last Friday I made my way to the airport, stepped up to the TSA security desk and discovered my license was missing. I had another government issued photo ID with me so I was not too concerned, but the calm began to erode over the weekend.
Continue reading this post…

Posted on July 14, 2015 by Bob Siegel - No Comments
Tags: , ;

 


Does your call center share too much personal information?

If you have done business with a company and reach out to their call center, how do they authenticate who you are? Do they ask you for personal information or ask you to verify personal information? Continue reading this post…

Posted on July 17, 2014 by Bob Siegel - No Comments
Tags: , , , ;

 


Technology cannot address all privacy concerns

On any given day there are seminars, webinars, and other talks about security’s role in protecting an enterprise’s information. Each one I attend seems to focus on how technology can save the day, but I suggest that technology cannot be the entire answer. Continue reading this post…

Posted on April 28, 2014 by Bob Siegel - No Comments
Tags: , ;

 


A First Timer’s Look at the 2014 IAPP Summit

As a first timer to the IAPP Summit, I have to say it was a great experience. I met with many privacy professionals and learned about some great ways others have dealt with their organizations privacy issues. The keynotes were exceptional and the different sessions I went to were extremely informative especially to someone new to the privacy field such as myself. Overall, it gave me a great idea of the direction the industry is moving, and it looks promising. Continue reading this post…

Posted on March 16, 2014 by Ben Siegel - No Comments
Tags: , , , , ;

 


Three thoughts on recent privacy breaches

The end of 2013 has brought a flurry of privacy breaches, some big, some small, each with their own circumstances, each with their own implications. Here are three thoughts from the past few weeks.
Continue reading this post…

Posted on December 29, 2013 by Bob Siegel - No Comments
Tags: , , , , , ;

 


Mobile phones, airplanes, and business privacy

The thought of air travel with someone nearby holding a conversation on a mobile phone is not pleasant (to say the least). I began to think about those people I typically see today holding last minute conversations, the ones just before the airplane doors close, and wondered about the impact on business’s privacy above 10,000 feet. Continue reading this post…

Posted on November 24, 2013 by Bob Siegel - No Comments
Tags: , ;

 


The Scope of the Privacy Office

Over the past several weeks I have worked with clients and students who have ask if the Privacy Office should have responsibility for an organization’s overall information protection program. This gets a resounding “Yes” as a response without asking about culture, organizational structure, or other considerations.
Continue reading this post…

Posted on November 10, 2013 by Bob Siegel - No Comments
Tags: , , ;

 


Subscribe to our mailing list

Please fill out the form below.

Required

Want to find out more?

Simply go to the contact page, fill out the form, and someone from Privacy Ref will be in touch with you. You can also send an email to info@privacyref.com or call (888) 470-1528.

News

May 10, 2017

Predictive Breach Cost Model
Download our predictive breach cost modelhere.

Latest Blog Posts

June 14, 2017

How Privacy Ref is getting GDPR Ready
The General Data Privacy Regulations, GDPR, are less than a year away.  Businesses around the world actively participating in the markets of the European Union are scrambling to comply with the new law.  We at Privacy Ref have been looking at how to best assess an organization’s readiness for compliance with the different articles of GDPR and have found an easy to understand way to meet this challenge. Continue reading this post...

June 7, 2017

The terrible, horrible, no good, very bad phishing email
I recently received an email that I knew was a fishing email after five seconds of inspection.  It wasn’t anything flashy that gave it away, just a slew of telltale signs that it wasn’t an authentic message, but some malicious correspondence meant to take advantage of a less informed individual.  It can be broken down into a number of steps that show just how quickly you can identify a scam email. Continue reading this post...

Other Recent Posts

PRIVACY REF