AI Criteria: Review

The most important piece of any privacy program handling or investigating the use of artificial intelligence is the review process. There are three areas to review, including the algorithm itself, the training data, and finally the outputs. This will act like a filter of increasing scrutiny as we...

AI criteria: Notice and Choice

Providing a privacy notice to individuals about  how their data is collected and processed is not a foreign concept to privacy professionals. We need to detail what information is collected, how it is used and shared, what rights subjects have, and provide them some way to ask questions or m...

AI criteria: Non-invasiveness

Privacy is often considering whether or not a use of information is appropriate. What is or isn’t appropriate is based on regulations and rules, but as I had written elsewhere, your own feelings might play into that as well (Empathic Privacy). Being non-invasive is a matter of considering if the ...

Privacy Training Is (Still) Vitally Important

Several years ago, I wrote a pamphlet for the International Association of Privacy Professionals titled Six Ways Privacy Awareness Training Will Transform Your Staff . The impacts identified in that paper continue to ring true as evidenced by them being described in the current iteration of ...

The terrible, horrible, no good, very bad phishing email

I recently received an email that I knew was a fishing email after five seconds of inspection.  It wasn’t anything flashy that gave it away, just a slew of telltale signs that it wasn’t an authentic message, but some malicious correspondence meant to take advantage of a less informed individ...

But Why A.I.?

During this past week we celebrated Data Privacy Day. As we usually do, Privacy Ref offered a free two hour presentation to introduce privacy to anyone interested. With over a hundred attendees, there were some great questions. One that was of particular interest was surrounding emerging topics f...

Human Errors Will Create Privacy Issues

Regardless of the technology you put in place, the safeguards you have implemented, and the training you have provided, ultimately the success of your privacy program relies on the individuals in your organization. The most recent example of this came at the expense of the US National Women’...

Three privacy thoughts to start 2016

Over the past few days I have been pondering everything that has happened in privacy in 2015 and the impact on organizations. My intent was to write a retrospective blog entry, but this morning I decided to look ahead and not in the rear-view mirror. So here are three thoughts to kickoff 2016.

5 Privacy Priorities for Business for 2015

In 2014 there seemed to be a new data breach every week. Be it credit card data, student information, social security numbers, or corporate intellectual property, the personal information of any business’s clients, employees, or of the business itself were exposed. Here are 5 priorities tha...

Privacy Awareness: Training lays the foundation

A successful privacy awareness program includes ongoing activities to keep privacy “top of mind” for the members of an organization. It supplements a privacy training program that conveys information in a formal learning environment. For an awareness program to meet its goals, a train...