Privacy Ref Blog by Tag

Tag "Legal Requirements" returned 13 posts


Privacy Ref and CyberDefenses Bring Privacy and Security Together

There is a saying that you can have security without privacy, but you cannot have privacy without security. While privacy and security are both concerned with the protection of information held by an organization, security provides the means to meet the business requirements identified to meet privacy demands from regulators, customers, employees, and other stakeholders.

Privacy Ref works with our clients to improve their business and operational practices for protecting personal information. Increasingly our clients’ have been looking for services to supplement their security practices, tools, and expertise. CyberDefenses fills this role. Continue reading this post…

Posted on August 14, 2017 by Bob Siegel - No Comments
Tags: , , , , ;

 


Privacy Impact Assessments: Organization-specific or Generic PIAs

I recently had a conversation with a colleague about privacy impact assessments, PIAs, and the tools available to administer them. We quickly became philosophical, trying to weigh whether a generic tool would work or if something that is organization specific is necessary.
Continue reading this post…

Posted on December 7, 2015 by Bob Siegel - No Comments
Tags: , , ;

 


Safe Harbor Found “Invalid”, Now What?

Transferring personal information from the EU to the US has been a challenge. Today it may have become more difficult with the EU Court of Justice finding that Safe Harbor is invalid. For those 4,000 or so businesses that use Safe Harbor for data transfers the question  is how to go ahead. Continue reading this post…

Posted on October 6, 2015 by Bob Siegel - No Comments
Tags: ;

 


Tom Brady, Joe Namath, and Privacy

Like many Americans I grew up idolizing football players, quarterbacks in particular. Joe Namath and Tom Brady are among those I have enjoyed watching play. Who would of thought that these two men who played in different eras would provide examples for a privacy discussion for business.
Continue reading this post…

Posted on August 12, 2015 by Bob Siegel - No Comments
Tags: , , , , ;

 


Crisis Communication Plans and Data Breaches

Think of a data breach as not only a possibility, but also a likely crisis scenario for your company. A breach will cost your company not only money but can deeply damage its reputation.

When was the last time your company reviewed its crisis communication scenarios and, most importantly, added data breach to the top of this list?
Continue reading this post…

Posted on August 6, 2014 by Dianna Fletcher - No Comments
Tags: , , ;

 


“It’s only an email address!”

Facebook, Ubisoft, and Morningstar are all recent examples of data breaches that involved the unauthorized release of email addresses. In one of several conversations I have had about these events some people could not understand why others were upset about the release; after all, they are only email addresses. Here is how I explained it.
Continue reading this post…

Posted on July 9, 2013 by Bob Siegel - No Comments
Tags: , , ;

 


Privacy and the Cloud

Cloud computing provides an opportunity for businesses to lower costs and increase their computing infrastructure’s flexibility. When utilizing a cloud service provider for additional storage, computing power, or a full application you should look into the privacy implications as these are multidimensional. Continue reading this post…

Posted on June 5, 2013 by Bob Siegel - No Comments
Tags: , , , , ;

 


SMB privacy: no free pass

Like larger enterprises, small and medium businesses (SMBs) collect personal information about their customers, employees, vendors and other stakeholders; it is just part of doing business. Establishing an SMB privacy program would be very beneficial for these businesses, but for the majority of SMBs the thought of protecting personal information is not a priority. At least one recent survey  found that over 70% of the SMBs questioned did not realize they had regulatory obligations to protect personal information.
Continue reading this post…

Posted on January 12, 2013 by Bob Siegel - No Comments
Tags: , , , , , ;

 


Don’t be too quick to publish a privacy notice

Having a privacy notice for customers to review is an essential part of any privacy program. When Delta Airlines added a privacy notice to their mobile app, “Fly Delta”,  to comply with California law, the policy did not reflect reality. When creating a privacy notice you need to say what you do and do what you say.
Continue reading this post…

Posted on December 10, 2012 by Bob Siegel - No Comments
Tags: , , , , , ;

 


Personal Information From Above

As a child growing up in New York City I always wanted to go to the Macy’s Thanksgiving Day Parade. The floats, the balloons, the clowns, the celebrities, the marching bands, the scraps of personal information….wait…personal information?
Continue reading this post…

Posted on December 3, 2012 by Bob Siegel - No Comments
Tags: , , , , ;

 


Next Page »

Subscribe to our mailing list

Please fill out the form below.

Required

Want to find out more?

Simply go to the contact page, fill out the form, and someone from Privacy Ref will be in touch with you. You can also send an email to info@privacyref.com or call (888) 470-1528.

News

April 16, 2018

IAPP Training Classes
Privacy Ref is proud to announce that we are an official training partner of the IAPP. You now have the opportunity to learn from one of our knowledgeable privacy professionals using the most respected training content in the industry. The robust interactive training offered, aids in the understanding of critical privacy concepts. The contents of the courses are integral to obtaining your privacy certifications and to educate your new team. Learn more here.

Latest Blog Posts

April 30, 2018

Defining GDPR for Non-Privacy People
During the IAPP’s most recent Privacy Summit, I was approached with an interesting question. “I am a privacy professional and I know why GDPR is important. I know about the fines and requirements for compliance, but few others at my company do. How do I explain GDPR to my colleagues effectively?” I responded with a quick and simple answer that probably did not cover all the bases, so I wanted to write up some deeper thoughts on the subject. Continue reading this post...

Breach Notification and Follow Up
Unfortunately, it is a given that as an organization you will receive a notice from a third party that they had an incident or breach that may have compromised personal or sensitive employee or customer information.  A majority of the breach laws require immediate notification or notification within a 24hr to 48hr timeframe, not including notification times from a contractual perspective. The question then becomes what does the third party need to provide, the level of assurance in order for an organization to re-establish connectivity and/or to use third-party moving forward. Continue reading this post...

Other Recent Posts

PRIVACY REF