Priva-See, Priva-Do

Most of these blogs come from the perspective of a privacy professional, noting what you can do to help your organization be better at handling privacy. Today, however, I want to talk about you. Individuals have a lot to consider regarding privacy, particularly when it comes to applications and o...

Privacy team GO!

It is a fairly common trope in comic books or other superhero media where the invincible villain is on the brink of victory only to be foiled at the last moment by an Achilles heel. “NOOO” they cry out; “My one weakness, how did you know!??!” Then the hero makes a pun, saves the day, […]

Practice Makes Perfect

Over the course of 2020 I have learned that practice does indeed make perfect. At the very least, practice does help you improve. An issue can be finding where to start, especially when covering a new topic. Making use of outside resources and other professionals is one option and is often the be...

A Tale of COVID and Privacy

My wife and I have been very careful about “staying within our Bubble,” but it was bound to happen. Someone outside of our small group had encountered someone who tested positive and the “Bubble” began to burst. It made me consider privacy in this time of pandemic.

Privacy Certification Exam Study Groups

Recently, Privacy Ref introduced study groups to assist in preparation for IAPP certification exams. It is a need to be filled that I have seen for a while and been asked about in my role as an instructor for the IAPP. The question is what makes Privacy Ref Certification Study Groups different?

Segregation of Duties and Data Inventories

A basic component of a privacy program is understanding what data you collect, where that data resides, and how it flows through your data processing systems. When combined with other characteristics of the data, this knowledge allows a privacy professional to understand what laws and regulations...

Data Breach

Havenly Data Breach Havenly, an interior design website, was recently a victim of a data breach. A group or individual hacker was able to gain access to databases containing roughly 1.3 million records. How this information was accessed is unclear, however there is a significant amount of informa...

The Weakest Embedded Link

The Weakest Embedded Link One of the most difficult vulnerabilities to overcome is human error. You cannot simply program your employees to only open specific emails or attachments and there is no guarantee that training will be effective. When it comes to phishing, you are only as strong as the ...

The Challenge of Data Transfers from the EU to the U.S.

It has been just over a week since Privacy Shield was invalidated, but it feels much longer. Like many privacy pros, I have spent several hours participating in webinars and working with clients to address how to legally accomplish data exports. My clients' question is consistent, "What do I do ...

EU-US Privacy Shield Found Invalid…Now What?

The EU Court of Justice has made a decision today to invalidate the EU-US Privacy Shield agreement. This is a significant change to the privacy landscape in the United States for companies transferring personal information from the EU. The short version of what was decided is that US companies co...