Three Random Privacy Stories…after Father’s Day

Father’s Day weekend has come and gone. Being with friends and family the discussion turned to memories, the future, and privacy (thanks NSA). I wanted to share three of the more entertaining and interesting discussions with you. To quote Jack Webb, “Only the names have been changed t...

Privacy and the Cloud

Cloud computing provides an opportunity for businesses to lower costs and increase their computing infrastructure’s flexibility. When utilizing a cloud service provider for additional storage, computing power, or a full application you should look into the privacy implications as these are ...

Valuable functionality can cause a privacy breach

Last Friday it was revealed that reporters from Bloomberg News could retrieve information from the profiles of subscribers to Bloomberg’s data terminals as well as the subscribers’ system usage (NYT article here). While I agree with the characterization of this incident as a “mi...

Change a process, update a form

I have had to a lot of personal information requested by different businesses over the past few weeks. Some of it was for credit card payments, some for insurance, and some other legitimate purposes. It was interesting to find the number of businesses that requested unnecessary personal informati...

Emerging technology, privacy, and your business

Google Glass has sparked a wide ranging discussion about the product’s potential  impact on privacy. The conversations I have seen have mostly focused on the impact to the existence of privacy in our technology-dependent world, but I have seen only limited discussion on the impact to a busi...

Fingerprints, privacy notice, and theme parks

My wife and I recently visited a major theme park and were surprised that our fingerprints were requested when we entered. While I understand the good business reason the fingerprints were requested, I remain dumbfounded why I could not find a privacy notice that disclosed how the information was...

Privacy observations while waiting for a memory upgrade

Deciding I needed a memory upgrade for my laptop, I went to the nearest Best Buy on the advice of another retailer. Things got a little complicated allowing me to spend about two and a half hours in the store. This gave me a chance  me to see how this particular Geek Squad protected privacy. My [...

Who is your staff friending?

Defining a social media policy is a difficult undertaking. It requires a balance of protecting your company’s privacy and restricting your employees’ online activities. When an employee friends a customer or vendor, a seemingly innocent post may result unintended consequences.

Mobile devices and business privacy

Before smartphones there were cameras. Businesses precluded the use of cameras within their premises by policy to protect intellectual property and privacy. Now, mobile devices have changed the rules (or at least bent them). Smartphones and tablets have become standard tools for our every day bus...