Human Errors Will Create Privacy Issues

Regardless of the technology you put in place, the safeguards you have implemented, and the training you have provided, ultimately the success of your privacy program relies on the individuals in your organization. The most recent example of this came at the expense of the US National Women’...

Three privacy thoughts to start 2016

Over the past few days I have been pondering everything that has happened in privacy in 2015 and the impact on organizations. My intent was to write a retrospective blog entry, but this morning I decided to look ahead and not in the rear-view mirror. So here are three thoughts to kickoff 2016.

5 Privacy Priorities for Business for 2015

In 2014 there seemed to be a new data breach every week. Be it credit card data, student information, social security numbers, or corporate intellectual property, the personal information of any business’s clients, employees, or of the business itself were exposed. Here are 5 priorities tha...

Privacy Awareness: Training lays the foundation

A successful privacy awareness program includes ongoing activities to keep privacy “top of mind” for the members of an organization. It supplements a privacy training program that conveys information in a formal learning environment. For an awareness program to meet its goals, a train...

Is your organization “privacy aware”?

Every time I read the news it seems there is a new data breach impacting client or employee privacy.  Just last week UPS, Supervalu, Community Health Systems, North Dakota University, Shaw’s / Star Market  / Albertson’s, and Schnucks have all been mentioned in articles related to new ...

A First Timer’s Look at the 2014 IAPP Summit

As a first timer to the IAPP Summit, I have to say it was a great experience. I met with many privacy professionals and learned about some great ways others have dealt with their organizations privacy issues. The keynotes were exceptional and the different sessions I went to were extremely inform...

Three thoughts on recent privacy breaches

The end of 2013 has brought a flurry of privacy breaches, some big, some small, each with their own circumstances, each with their own implications. Here are three thoughts from the past few weeks.

Wearable technology is coming, but will anyone notice?

When I look through corporate handbooks I often find prohibitions on the use of cameras or recording devices while on a company’s premises. It’s not something that gets brought up in new hire orientation nor something that gets brought up very often at all. Let’s face it, there is a certain amoun...

Three thoughts for business from the NSA privacy incidents

Yesterday the Washington Post published an article  based on an audit dated May 2012 describing violations of privacy rules by the NSA. As I read the article three thoughts occurred to me that a business can take away for their own privacy program.

Valuable functionality can cause a privacy breach

Last Friday it was revealed that reporters from Bloomberg News could retrieve information from the profiles of subscribers to Bloomberg’s data terminals as well as the subscribers’ system usage (NYT article here). While I agree with the characterization of this incident as a “mi...