All Feature articles – Page 15
-
Feature
What is the true cost of handling DSARs?
The Data Subject Access Request (DSAR) has become synonymous with protecting individuals’ data privacy rights from misuse by public administrators and private enterprise.
-
Feature
Rethinking ‘Disproportionate Effort’ exemption under GDPR for web-scraping
Can Data Controllers (web-scrapers) be exempt from the requirement to provide privacy notice if doing this is high-cost and it drains company resources? If they can, how?
-
Feature
Stablecoins ecosystem: a promise that can be kept
The European Parliament, on 13 September 2019, issued a note wherein it observed that the introduction of a privately governed currency (here, Libra) could fundamentally challenge the current EU financial framework, conflict with EU law and tax requirements, and violate consumer rights.
-
Feature
Data Privacy vs Utility Fallacy
Among the many serious challenges the COVID-19 pandemic has presented businesses and individuals alike with, a long talked about and complex discussion has also arisen once again: what is worth giving up personal privacy for?
-
Feature
GDPR 2 Years In: Achieving GDPR Compliance 2 Years On
“Data is the new oil”, is a phrase we hear too often in the modern world. Organisations across the world are transacting and storing explosive amounts of data. This data includes sensitive private data belonging to their customers.
-
Feature
Remote Working: The Information Governance Challenge of the Decade
Whilst having to adapt to a new normal, people around the world are experiencing firsthand the difficulties of working and even schooling from home. Not only are we trying to balance work and life over the long haul, but we are also frantically juggling work and life in real-time.
-
Feature
Privacy Landscape in the Middle East
Privacy landscape in the Middle East has been flourishing in the last ten years with privacy laws and regulations emerging across the region.
-
Feature
Centralised versus decentralised contact tracing solutions
A row has broken out between two different groups of academics on whether a centralised or decentralised system of contact tracing solution is best for preserving privacy.
-
Feature
Data localisation: India’s step back from globalisation
Data localisation is a key aspect in the Indian government’s cloud computing policy, the RBI’s mandate for financial data and the successive data protection bills that have been proposed.
-
Feature
Coronavirus quarantine and cybercrime
The increase and global spread of cybercrime is partly linked to the amount of people being online, the increase of devices being used by each one of us and to the amount of time we spend online.
-
Feature
Addressing Privacy and Data Security Implications of the Coronavirus
COVID-19 arrives just as the first omnibus privacy statute in the United States, the CCPA became effective. Since its January 1 effective date, we continue to wait for finalization of the CCPA regulations and enforcement that was slated for July 1.
-
Feature
GDPR: Processing of employees health data within companies
This paper deals with how to solve data protection challenges and privacy approaches, since many companies are currently facing the question of how to deal with the personal health data of their employees.
-
Feature
The global evolution of data protection law
The introduction of the California Consumer Privacy Act (CCPA) at the beginning of the year continues a global trend of law-makers introducing new and more stringent rules for companies using individuals’ data.
-
Feature
Facial recognition: compliance in the age of GDPR
Facial recognition is a growing phenomenon but one that presents a potential minefield for companies who are collecting and using personal information.
-
Feature
Battling the rise of the deepfakes
Deepfake videos are becoming commonplace. So much so that you may have come across one without realising. Today, over 15,000 deepfakes are reportedly lurking online.
-
-
Feature
Why anonymisation does not work for big data
Recently, well-publicised research by data scientists at Imperial College in London and Université Catholique de Louvain in Belgium as well as a ruling by Judge Michal Agmon-Gonen of the Tel Aviv District Court have highlighted the shortcomings of outdated data protection techniques like “Anonymisation” in today’s big data world.
-
Feature
Why employees are a threat to cyber security
The most common cyber attacks reported by UK companies in 2018 were all incidents that take advantage of employees and pose significant risks to businesses.
-
Feature
Interview: Behind The Great Hack, with David Carroll
Released this summer on Netflix, The Great Hack is a documentary that explores the murky data-sharing relationship between Facebook and Cambridge Analytica.
-
Feature
Can artificial intelligence beat a human hacker?
At some point, we have all completed a captcha to prove we are human when online. So, when a robot successfully completed the test, we were left asking, are our computers secure?