Showing Posts In "Data Protection and Privacy" Category


The best way for organizations to prepare for the GDPR, according to Thymometrics, an employee engagement software firm based in Cambridge in the United Kingdom, is to ensure that HR is involved in the process. For example, Jerry Pett, CEO and co-founder of Thymometrics, suggested in a blog post that HR can prepare for compliance […]

Employer Privacy Policies: A How-To Guide

Five states, including Michigan, Connecticut, Massachusetts, Texas and New York, each have enacted statues that may require employers to create employee privacy policies. Employers who unlawfully disseminate an employee’s social security number face a fine of $500. In Michigan, $275,000 was awarded to a group of employees who sued their union after it failed to […]

Ten Tips for Addressing Employee Snooping of Personal Data

Without the proper safeguards in place, employee snooping can take place in any company, allowing access to personal data. The Office of the Privacy Commissioner of Canada has recommended that companies educate their employees by fostering a culture of privacy, having periodic training and reminders, and enforcing consequences. They should also protect by ensuring access […]

Five Steps to Protect Your Business from a Data Breach

Since the 1970s, the Federal Trade Commission has been the chief agency on privacy policy and enforcement through the Fair Credit Reporting Act to ensure that sensitive employee data remains safe and secure. According to the FTC, identity theft topped the national ranking of consumer complaints, with fake debt collection and impostor scams close behind. […]

Data Theft Rises Sharply, Insiders to Blame

A new survey exploring the main causes of corporate data breaches suggests that three out of four organizations in the US have been hit with the loss or theft of sensitive data in the last two years — and insiders are usually the ones at fault. According to the researchers involved in the study, rising […]

New Report Finds Insider Corporate Data Theft and Malware Infections Among Biggest Threat to Digital Business in 2016

Insider data theft and malware attacks top the list of the most significant concerns for enterprise security executives, a new report from Accenture and HfS Research reveals. Of those surveyed, a majority (69%) of respondents experienced an attempted or successful theft or corruption of data by insiders during the prior 12 months, with media and […]

Ten Tips for Addressing Employee Snooping of Personal Data

Ensuring that personal information held by an organization remains confidential and is seen only by employees who need it and for legitimate business purposes is a challenge that needs to be taken seriously. Accountability remains with the organization to safeguard personal information from unauthorized users or disclosure. The Office of the Privacy Commissioner of Canada […]

EU Data Transfers to the U.S.: Considering Your Options after Privacy Shield

With the recent approval of the EU-US Privacy Shield framework and the ability to start filing online registrations on 1 August, many companies have questions about the advantages and disadvantages of Privacy Shield as compared to other cross-border transfer mechanisms to cover trans-Atlantic data flows. Hogan Lovells answers your questions in their publication International Data Transfers – […]

EU Member States Approve Privacy Shield

On July 8, 2016, EU representatives on the Article 31 Committee approved the final version of the EU-U.S. Privacy Shield to permit transatlantic transfers of personal data from the EU to the U.S. The Privacy Shield is a successor framework to the Safe Harbor, which was invalidated by the Court of Justice of the European […]

Beyond Breach Prevention: The Need for Adequate Response

If there’s been any lesson learned in the past decade, it’s that despite tens of billions having been spent on anti-malware, firewalls, intrusion-detection and prevention systems, and other defensive technologies, it’s just not realistic for enterprise security teams to expect to be able to stop every attack. Yet, surprisingly, enterprises focus their efforts and their […]

Subscribe to our Publications