Is the use of the Meta pixel a VPPA violation?

An increasing number of class action lawsuits are being raised alleging violations of the Video Privacy Protection Act, or VPPA, sharing a common thread which is the use of the Meta pixel on videos. Volume up on Video Privacy Protection Act litigation If the class action lawsuits are ringing alar...

Privacy Training Is (Still) Vitally Important

Several years ago, I wrote a pamphlet for the International Association of Privacy Professionals titled Six Ways Privacy Awareness Training Will Transform Your Staff . The impacts identified in that paper continue to ring true as evidenced by them being described in the current iteration of ...

AI Criteria: Proportionality

Where necessity is all about whether AI-based processing would be possible, proportionality is all about the acceptability of the processing. Proportionality can also refer to the amount of information collected, as processing too much information can be directly disproportionate to the task at h...

How to win employee participation in cybersecurity

In any cybersecurity program, as with a privacy program, the team leading the program relies on the cooperation and participation of the average employee. Here are some tips for getting employees involved in efforts sparked by the occurrence of Cybersecurity Awareness Month. Automate processes An...

AI criteria: Measuring Necessity

In May I presented a privacy focused look into artificial intelligence. I went over 7 criteria to review prior to implementing any use of AI. The first of these was necessity, whether aspects of the proposed use of AI is needed or not. As part of a series of blogs, I will go over what […]

The terrible, horrible, no good, very bad phishing email

I recently received an email that I knew was a fishing email after five seconds of inspection.  It wasn’t anything flashy that gave it away, just a slew of telltale signs that it wasn’t an authentic message, but some malicious correspondence meant to take advantage of a less informed individ...

AI voice scams

How to respond to AI voice scams I read a post on Facebook this morning warning me of the risk of my voice being collected for an AI voice scam. The post said that a woman answered a call from an unknown number, and the person on the other end seemed to intentionally be asking […]

Iowa Privacy Law

Iowa establishes a state privacy law In March, a new privacy law was approved in Iowa, which makes them the sixth state to establish a general privacy law for residents. Here are the top three things to know about the Iowa law and what your business needs to do to comply. 1    ...

A proposal for an AI Risk Framework

The use of artificial intelligence has become more common place and so I have begun reading and researching more about AI with regards to privacy. AI is a topic of interest for many not only because it allows for increased efficiency in many areas, but also because it opens up new ways to analyze...

Click to CANCEL

This morning I was listening, much to my children’s chagrin, to NPR as I dropped them off at school. One subject that came up was a new push by the Federal Trade Commission to rein in subscription services that make it nearly impossible to unsubscribe from. This story included direct comment from...