fbpx

Download free GDPR compliance checklist!

Category Archives for "Research"

IAPP-EY Annual Governance Report 2017

This third annual study of data governance in organizations, surveying modern privacy operations about the present and future of the privacy profession, reflects significant changes in privacy programs globally in response to the GDPR. An astonishing 95 percent of survey respondents, more than 75 percent of whom are located outside of the European Union, say the GDPR applies to their organization.

Source: IAPP-EY Annual Governance Report 2017

OTA releases new multi-industry privacy and security audit

The Online Trust Alliance has released the results of its ninth annual Online Trust Audit and Honor Roll, this year finding an overall increase in trustworthy websites, with some caveats. Consumer services websites — non-retail sites that require a login — received the OTA’s highest marks, while banking and government websites scored the lowest.

Source: OTA releases new multi-industry privacy and security audit

Practical Approaches to Big Data Privacy Over Time

In this article, we examine a range of longterm data collections, conducted by researchers in social science, in order to identify the characteristics of these programs that drive their unique sets of risks and benefits. We also examine the practices that have been established by social scientists to protect the privacy of data subjects in light of the challenges presented in long-term studies. We argue that many uses of big data, across academic, government, and industry settings, have characteristics similar to those of traditional long-term research studies. In this article, we discuss the lessons that can be learned from longstanding data management practices in research and potentially applied in the context of newly emerging data sources and uses.

Source: Practical Approaches to Big Data Privacy Over Time | Harvard University Privacy Tools Project

Managing Workforce Cyber Risk in a Global Landscape: A Legal Review

Whether malicious or inadvertent, workforce actions cause or contribute to over half of cyber attacks experienced by organizations. Protecting against such “insider” cyber risks can be challenging, especially given the global web of privacy, communications secrecy, and employment laws that may be implicated by monitoring workforce use of IT resources.

Source: Managing Workforce Cyber Risk in a Global Landscape: A Legal Review

‘Gaydar’ Shows How Creepy Algorithms Can Get

Artificial intelligence keeps getting creepier. In one controversial study, researchers at Stanford University have demonstrated that facial recognition technology can identify gay people with surprising precision, although many caveats apply. Imagine how that could be used in the many countries where homosexuality is a criminal offense.

Source: ‘Gaydar’ Shows How Creepy Algorithms Can Get – Bloomberg

1 26 27 28 29 30 32
>