Privacy Ref Blog by Tag

Tag "Technology" returned 13 posts


My first wearable technology adventures

Over the past few weeks I have started to wear my Google Glass in public. The experiences have been invaluable to my understanding of the privacy implications of wearable technology. My evolving perspective on wearable technology has been somewhat unexpected. Continue reading this post…

Posted on January 5, 2014 by Bob Siegel - No Comments
Tags: , , , ;

 


A Privacy Pro and Wearable Technology

Privacy professionals, including myself, have been warning of the dangers to privacy from wearable technology. The concerns I have been expressing have been based on reported product capabilities, anecdotal evidence, and published reports. So when I had the opportunity to join the Google Glass Explorer program, I jumped at the chance.
Continue reading this post…

Posted on December 22, 2013 by Bob Siegel - No Comments
Tags: , , , , , ;

 


Wearable technology is coming, but will anyone notice?

When I look through corporate handbooks I often find prohibitions on the use of cameras or recording devices while on a company’s premises. It’s not something that gets brought up in new hire orientation nor something that gets brought up very often at all. Let’s face it, there is a certain amount of convenience to taking out your smartphone and snapping a picture of the notes on the whiteboard or recording a meeting to create the minutes later.

While you can get technology that can perform these functions surreptitiously, main stream commercial technology would require you to be fairly overt when taking a picture or making a recording. Since people will know you are capturing something they can object (or report you to corporate security if they want to be nasty). Wearable technology will change this. Continue reading this post…

Posted on August 21, 2013 by Bob Siegel - No Comments
Tags: , , , , ;

 


Three thoughts for business from the NSA privacy incidents

Yesterday the Washington Post published an article  based on an audit dated May 2012 describing violations of privacy rules by the NSA. As I read the article three thoughts occurred to me that a business can take away for their own privacy program. Continue reading this post…

Posted on August 16, 2013 by Bob Siegel - No Comments
Tags: , , , ;

 


Leave a hair, lose some privacy

We all have seen those police dramas where a forensics specialist finds a hair at a crime scene, the DNA is extracted, and a suspect confirmed. Heather Dewey-Hagborg has taken this a bit further with her project Stranger Visions providing an insight into how that simple hair may compromise privacy.
Continue reading this post…

Posted on July 2, 2013 by Bob Siegel - No Comments
Tags: , ;

 


Three Random Privacy Stories…after Father’s Day

Father’s Day weekend has come and gone. Being with friends and family the discussion turned to memories, the future, and privacy (thanks NSA). I wanted to share three of the more entertaining and interesting discussions with you. To quote Jack Webb, “Only the names have been changed to protect the innocent.” Continue reading this post…

Posted on June 17, 2013 by Bob Siegel - No Comments
Tags: , ;

 


Valuable functionality can cause a privacy breach

Last Friday it was revealed that reporters from Bloomberg News could retrieve information from the profiles of subscribers to Bloomberg’s data terminals as well as the subscribers’ system usage (NYT article here). While I agree with the characterization of this incident as a “mistake”, wasn’t this really a violation of basic privacy principles?
Continue reading this post…

Posted on May 12, 2013 by Bob Siegel - No Comments
Tags: , , , , , ;

 


How easy are you to find using limited personal information?

This weekend I was involved in an event that allowed me to see just how easy it is to find an individual given a minimum of personal information. I knew it would be easy, but how easy was the surprise. Continue reading this post…

Posted on May 5, 2013 by Bob Siegel - No Comments
Tags: , , , , ;

 


Change a process, update a form

I have had to a lot of personal information requested by different businesses over the past few weeks. Some of it was for credit card payments, some for insurance, and some other legitimate purposes. It was interesting to find the number of businesses that requested unnecessary personal information  because that is the way it has always been done by their company.

Continue reading this post…

Posted on April 14, 2013 by Bob Siegel - No Comments
Tags: , ;

 


Emerging technology, privacy, and your business

Google Glass has sparked a wide ranging discussion about the product’s potential  impact on privacy. The conversations I have seen have mostly focused on the impact to the existence of privacy in our technology-dependent world, but I have seen only limited discussion on the impact to a business. It would be nice for businesses to be proactive in considering policies for emerging  technology instead of reacting as things evolve. Continue reading this post…

Posted on March 24, 2013 by Bob Siegel - No Comments
Tags: , , , ;

 


Next Page »

Subscribe to our mailing list

Please fill out the form below.

Required

Want to find out more?

Simply go to the contact page, fill out the form, and someone from Privacy Ref will be in touch with you. You can also send an email to info@privacyref.com or call (888) 470-1528.

News

May 10, 2017

Predictive Breach Cost Model
Download our predictive breach cost modelhere.

Latest Blog Posts

October 30, 2017

PSR 2017 in Review
After a long trip from the northeast to San Diego, I finally made it to another exciting Privacy, Security, and Risk Conference from the IAPP. With GDPR on the horizon, the air was thick with discussion of this regulation in effect in May of next year. Even more so, a lot of questions received at the Privacy Ref booth were focused on this law, or preparing a privacy program through assessments data mapping. Overall, a great show with a few major themes. Continue reading this post...

The key to effective privacy training
I spend a lot of time facilitating privacy training. Whether it is directly for our clients or on behalf of the IAPP or their training partners, there are common elements to a successful educational event. Continue reading this post...

Other Recent Posts

PRIVACY REF