All Feature articles – Page 14
-
Feature
Data Privacy vs Utility Fallacy
Among the many serious challenges the COVID-19 pandemic has presented businesses and individuals alike with, a long talked about and complex discussion has also arisen once again: what is worth giving up personal privacy for?
-
Feature
GDPR 2 Years In: Achieving GDPR Compliance 2 Years On
“Data is the new oil”, is a phrase we hear too often in the modern world. Organisations across the world are transacting and storing explosive amounts of data. This data includes sensitive private data belonging to their customers.
-
Feature
Remote Working: The Information Governance Challenge of the Decade
Whilst having to adapt to a new normal, people around the world are experiencing firsthand the difficulties of working and even schooling from home. Not only are we trying to balance work and life over the long haul, but we are also frantically juggling work and life in real-time.
-
Feature
Privacy Landscape in the Middle East
Privacy landscape in the Middle East has been flourishing in the last ten years with privacy laws and regulations emerging across the region.
-
Feature
Centralised versus decentralised contact tracing solutions
A row has broken out between two different groups of academics on whether a centralised or decentralised system of contact tracing solution is best for preserving privacy.
-
Feature
Data localisation: India’s step back from globalisation
Data localisation is a key aspect in the Indian government’s cloud computing policy, the RBI’s mandate for financial data and the successive data protection bills that have been proposed.
-
Feature
Coronavirus quarantine and cybercrime
The increase and global spread of cybercrime is partly linked to the amount of people being online, the increase of devices being used by each one of us and to the amount of time we spend online.
-
Feature
Addressing Privacy and Data Security Implications of the Coronavirus
COVID-19 arrives just as the first omnibus privacy statute in the United States, the CCPA became effective. Since its January 1 effective date, we continue to wait for finalization of the CCPA regulations and enforcement that was slated for July 1.
-
Feature
GDPR: Processing of employees health data within companies
This paper deals with how to solve data protection challenges and privacy approaches, since many companies are currently facing the question of how to deal with the personal health data of their employees.
-
Feature
The global evolution of data protection law
The introduction of the California Consumer Privacy Act (CCPA) at the beginning of the year continues a global trend of law-makers introducing new and more stringent rules for companies using individuals’ data.
-
Feature
Facial recognition: compliance in the age of GDPR
Facial recognition is a growing phenomenon but one that presents a potential minefield for companies who are collecting and using personal information.
-
Feature
Battling the rise of the deepfakes
Deepfake videos are becoming commonplace. So much so that you may have come across one without realising. Today, over 15,000 deepfakes are reportedly lurking online.
-
Feature
Why anonymisation does not work for big data
Recently, well-publicised research by data scientists at Imperial College in London and Université Catholique de Louvain in Belgium as well as a ruling by Judge Michal Agmon-Gonen of the Tel Aviv District Court have highlighted the shortcomings of outdated data protection techniques like “Anonymisation” in today’s big data world.
-
Feature
Why employees are a threat to cyber security
The most common cyber attacks reported by UK companies in 2018 were all incidents that take advantage of employees and pose significant risks to businesses.
-
Feature
Interview: Behind The Great Hack, with David Carroll
Released this summer on Netflix, The Great Hack is a documentary that explores the murky data-sharing relationship between Facebook and Cambridge Analytica.
-
Feature
Can artificial intelligence beat a human hacker?
At some point, we have all completed a captcha to prove we are human when online. So, when a robot successfully completed the test, we were left asking, are our computers secure?
-
Feature
The importance of consent and privacy when deploying voice biometrics
In a recent discussion with an acquaintance the following question was posed; would it bother you if a biometric template of yourself, any biometric at all, was stored by a third-party, be that a bank, healthcare provider, government agency or any other responsible entity?
-
Feature
The importance of securing customer data over the phone
Ensuring the safety of customers’ financial data is a priority in an era of ever-tighter regulations and increasing pressure. Breaches of credit card details, passwords or bank account information have sadly been a common occurrence in recent years – 2018 alone saw several major airline companies suffer cyber-attacks leading to thousands of customers falling victim to the theft of their financial details.
-
Feature
BYOD and GDPR: Managing the compliance conundrum
Today’s employees want the freedom to work from any location and any device at any time of day. These individuals are increasingly using their personal ‘smart’ mobile devices to conduct business.