Data loss incidents for the UK's Home Office are up 120% over the past two fiscal years, finds Parliament Street, a think tank that studies cybersecurity. A high-profile case occurred last year when Home Office documents about possible ways to track migrants using digital IDs were leaked.
Northwestern University MS in Information Systems Prepare for IT management roles and build the skills needed to design and implement technology solutions that propel organizations forward. Choose from eight specializations to suit your goals. Study online and on campus. Learn more.
A nonprofit consumer group is suing Zoom Video Communications, accusing the popular videoconferencing platform of giving users "a false sense of security." Consumer Watchdog filed the lawsuit in the Superior Court of the District of Columbia, alleging that Zoom violated D.C.'s Consumer Protection Procedures Act.
The Irish Council for Civil Liberties has filed further accusations against Google, which is facing an ongoing complaint that it violated EU privacy rules. The new complaints center on Google's handling of personal data through its Ad Exchange service, where advertisers bid to offer ads based on users' interests and history of web browsing.
Claiming that US users' data "is especially compromised because the Chinese government can access it" ignores realities, Doris Tian writes. In this commentary about the controversial sale of TikTok's US operations, Tian writes that big media companies in the US "all have user data that is currently stored and used by Chinese ad tech firms."
Creating an automated data security operations setup ensures that data are encrypted before they leave a company's firewall, says Ameesh Divatia, CEO of Baffle, which secures cloud data. Divatia offers five tips, concluding with the necessity of limiting and monitoring access to the data.
Privacy is not just a compliance issue anymore. It is about managing consumer trust and safeguarding personal data during the data life cycle. Implementing privacy risk management is a critical step to providing the foundation for effective privacy management. Full Story: ISACA.
Data anonymization is a good technique for protecting personal information and can be achieved in several ways, Astha Oriel writes. In this analysis, Oriel outlines six ways to alter data and deter hackers, starting with masking, which includes the "swap and replace" technique of substituting characters or words.
Even though Switzerland is not an EU member, its Privacy Shield agreement with the US fell victim to the Schrems II data transfer decision, Swiss regulators report. The agreement technically remains in place, but Switzerland now considers the US a data transfer partner requiring "additional safeguards."