A privacy impact assessment (PIA) is an essential element for effective privacy by design. It enables privacy leaders to be assured that the privacy controls implementation satisfies regulations and organizational requirements, and is key to determining what steps must be taken to manage privacy risk for the organization. The standard ISO 29134 (Guidelines
Privacy Impact Assessments (PIA) analyze how a unit collects, uses, shares, and maintains individually identifiable information. In this podcast and companion article titled “Privacy Impact Assessment: The Foundation for Managing Privacy Risk,” Mr. William Stallings delivers insightful and practical guidance on understanding and identifying the range of
When visiting the eBay.com site, a script will run that performs a local port scan of your computer to detect remote support and remote access applications.
CSIAC SME and member of the American Bar Association's Information Security Committee, Richard "Rick" Aldrich, gives a snapshot of the recent developments in cyberlaw, policy, standards, court cases and industry legal frameworks. This report provides updates to an earlier report on cyberlaw from June of 2019 which can be viewed here:
CSIAC SME and member of the American Bar Association's Information Security Committee, Richard "Rick" Aldrich, gives a snapshot of the recent developments in cyberlaw, policy, standards, court cases and industry legal frameworks. This report provides updates to an earlier report on cyberlaw from March of 2019 which can be viewed here:
The Science of Security and Privacy (SoS) Initiative, sponsored by the National Security Agency Research Directorate, fosters a self-sustaining, open, and public security science research community to discover key cyber principles necessary to support improved explanations, predictions and confirmation or validation of predicted outcomes. The discipline of
The Internet of Things – the increasingly connected world in which we live – is rapidly expanding. We love our convenient and fun devices – like personal assistants, wearables, speakers, cameras, TVs, cars, home alarm systems, toys and appliances. But it’s important to understand that connected devices rely on information about us – such as our behaviors
In the future, we will continue to see arguments over the degree of privacy users can expect from internet service providers and other businesses. Users must be aware of the data that they share online by reading privacy statements that are posted on company websites and forms. It is imperative that users understand how their data will be used once it has
The way that Firefox caches intermediate CA certificates could open the door to the fingerprinting of users and the leaking of browsing details, a researcher warned this week.
Amazon's Echo devices and its virtual assistant are meant to help find answers by listening for your voice commands. However, police in Arkansas want to know if one of the gadgets overheard something that can help with a murder case.