Data Privacy Day
Our personal information can be anything about us, including the comments, links and photos we post on social media. What we share on social networks can reveal information about our families, friends and acquaintances, and our posts can be used or taken out of context in surprising ways. #HasJustineLandedYet is a perfect example of why everyone should think before posting something online. This month's #ChatDPD Twitter chat offers tips from privacy experts on how to share with care and enjoy the full benefits of the Internet.
In honor of Data Privacy Day, NCSA and the Georgia Institute of Technology's Scheller College of Business and School of Interactive Computing held an interactive, lively and revealing conversation with leading technology and privacy experts. The discussion centered on the future of health privacy and the pioneering technologies that are changing the game.
It may sound ridiculous at first, but a strategic deployment of the most common and visible form of personally identifiable information - the humble email address - might be enough to send a would-be identity thief packing to an easier mark.
Here are 10 ways to safeguard your information from the most common threats and vulnerabilities that put you, your family and your office at risk.
An anonymous, unnamed CEO for a popular transparency company whose mascot is a ghost is fond of saying "running a business these days would be easy - if it weren't for all the people and computers." It's a joke meant to add perspective to everyday problems - but it can also apply to just trying to comfortably exist in the "Information Age."
We need to prioritize the importance of developing a comprehensive plan for data privacy and student learning - one that is thoughtful, balanced and comprehensive. We don't want to get this wrong. We can't. Too much is at stake for this and the next generation of students.
It's time for a reality check: complete anonymity online is not possible. The myth distracts people from what they should really be looking for in privacy programs and services: transparency, trust, ease of use, performance and reliability.
Data never dies. And data doesn't have a conscience - this immortal resource comes with significant risk. Time for a closer look.
While constant connectivity has its benefits, the rise of mobile devices and the proliferation of WiFi networks can be a dangerous coupling. In fact, many WiFi hotspot users are unaware of the inherent risks that the technology poses - such as an increased risk of identity theft, hacking and compromised bank accounts.
In today's mobile, connected world, we access the Internet everywhere and from multiple devices as we work, play and travel. This chat will offer ways that you can protect your privacy on the go.
Yeah, you got a new computer. So what's next? Securely migrating to a new computer can be done in just 5 steps.
A 2014 privacy study found the most important issue for the majority of Americans is transparency: to understand how a business collects, uses and shares personal information - in conclusion, Privacy Is Good For Business. This #ChatDPD will provide tips to help business better address consumer privacy concerns and avoid privacy practices that are perceived as bad or "creepy" that can also harm your company’s reputation.
The term "Big Data" carries a lot of weight. So what should we think when we hear news reporters and insiders talk about "Big Data"? How can we manage what we contribute to its vast (and seemingly scary) collection of information?
In 2014 there seemed to be a new data breach every week. In these breaches of credit card data, student information, Social Security numbers and corporate intellectual property, the personal information of many businesses' clients and employees was exposed. Here are five priorities to consider for your business as we embark on 2015.
#ChatDPD Twitter Chat Transcript: Make a New Resolution: Stay On Track While Protecting Your Health Information
Your health, physical activity and eating habits are some of the most personal and sensitive details about you and your lifestyle. Most of us are unaware, however, of all the places our data may end up on a given day. Join us for another #ChatDPD to discover your health data's journey in our digitally-connected world and learn steps you can take to protect your privacy.
Privacy is a personal notion - we all have different ideas of what it means to properly manage information about who we are and how we behave. We've gathered a few interesting points about worldwide privacy legislation which show that how much others know about who you are can depend largely on where you are.
The movie Big HIPAA 6 is about a robot that can scan humans, discovering everything from small scratches and bumps to the amount of serotonin in your body at the moment. That got me thinking about the implications to the Health Insurance Portability and Accountability Act (HIPAA) or other privacy concerns that come with this technology.
It's important to educate yourself and practice the best habits to keep your data secure. Learn more about cookies and how you can protect your personal information.
The beginnings of Chris "Biggie Smalls" Wallace can be traced to the streets of Bed-Stuy, Brooklyn. The neighborhood is only 9 miles away from the new data-driven Madison Avenue as the crow flies - but they're worlds apart in terms of culture. Still, Big Poppa and Big Data have more in common than you might think.
The folks at Dictionary.com chose "privacy" as their word of the year in 2013. It was a long journey to that distinction, during which it inexorably became the engine driving more companies than not. Privacy is the consumer-consequence manifestation of big data, which increasingly shapes approaches to marketing, product development and a vast array of services. In short, privacy has become a price of consumption.
The holidays are the busiest time of year for shopping, and not just for consumers: while online sales are booming, personal information about you is being collected and shared. This chat will highlight the value of your personal information and how you can protect it this holiday shopping season.
There is a golden rule of customer data: you are responsible for all customer data that you request. Using this as a guideline, check out these best practices for taking care of customer data.
The Microsoft Innovation and Policy Center and the New York University (NYU) Information Law Institute recently partnered to host a symposium on student privacy in higher education entitled "Building Privacy into Data-Driven Education." The event examined the new ethical concerns, legal questions and institutional challenges raised by the growth in use of data-driven platforms at higher education institutions.
Privacy as a relevant everyday concept has been pushing its way into the mainstream, and the events of the last couple of years have accelerated that trend. It's unfamiliar territory for us - is privacy trendy?
As the holiday shopping bustle approaches, don't just think about buying the perfect gift and getting a great deal. For a happy and healthy season, remember that being cyber secure when you make your holiday purchases online is just as important!
At the Privacy Identity Innovation conference last week, Metanautix's Jim Adler proposed that, while transparency can be a good "disinfectant" for companies to adopt, "disinfectants sting." Adopting transparency is "meant to hurt a little." It’s a smart observation, and it’s worth exploring from both sides. Why does transparency sting, and is it worth the short-term pain?
When you visit a webpage, loads of information is traded back and forth between your browser and the web server. This transfer was designed to make sure that the server has all the information it needs to properly display the page you're looking at. But the architecture of the web means that all of this information is available on every single call. Learn more about what your browser communicates when you surf the web.
Data Privacy Day (DPD) is an international effort centered on "Respecting Privacy, Safeguarding Data and Enabling Trust," and your organization has a role to play. To get involved today, register your organization as a DPD Champion.
Finding the right balance when it comes to social media sharing isn't an easy feat, but there are several things you can do to protect your personal information on social media.
Step one for talking privacy is getting our vocabulary in order. So let's start with the basics and move on to several recent terms of endearment in the data management discussion.
Post your commitment to the ethical and innovative use of data on social media to help meet the goal of 100,000 pledges by Data Privacy Day (Jan. 28, 2015)!
The Advisory Committee to the Congressional Internet Caucus recently held an event and panel discussion about the May 2014 “right to be forgotten” ruling in Europe. Since May, many concerns have been raised regarding how the “right to be forgotten,” intended to protect citizens’ privacy, could limit access to important information and compromise transparency. Additionally, some have voiced concerns about how the ruling could impact American Internet users in the event that search engines deleted requested results not only within the EU but globally.
When it comes to tightening your Internet and computer privacy security, one crucial step you can take is to learn more about how your online activities leave confidential traces behind on your hard drive.
The Center for Democracy & Technology (CDT) recently held the first event in a series that tackles various aspects of our digital lives, focusing on emerging technologies and the transformation of traditional industries through technology and data. This series asks participants to consider the ways that being “always on” impacts us and how we relate to each other.
The National Cyber Security Alliance recently partnered with data privacy management company TRUSTe on the Internet of Things (IoT) Privacy Summit, held July 10 in Silicon Valley, California. This event, which featured presentations by technology, privacy, business and policy experts, addressed the privacy questions and needs related to the Internet of Things, or the growing world of web-connected devices and products.
Growing your business is top of mind yet one data breach can financially devastate your company. This ChatDPD highlights ways small biz can prioritize privacy and establish a strong baseline for a proactive and defensive data protection plan. Guests: @ATTSmallBiz, @PrivacyProf, @PrivacyPros
According to newly-released EMC Privacy Index, 84% of consumers don't like anyone knowing anything about themselves or their habits unless they make a decision to share that information.
From a series of university data breaches to the recent settlement a teen student received after school officials demanded her Facebook password, student privacy is the one of the hottest topics in 2014.
Data privacy is something that can be built into systems, taught to users of systems and valued by good old fashioned entrepreneurial techniques. All it takes is a little know how, creativity and the desire to build respect for data about people into technical solutions and organizations.
Consumers are becoming less naive regarding data about them being collected and shared, but they should become more knowledgeable about how those processes work and the risks involved, NCSA executive director Michael Kaiser told the Privacy Piracy Radio Show on 88.9 FM KUCI in Irvine, CA.
Leading identity theft experts from The Identity Theft Council, National Consumers League, ID Theft Resource Center, PRIVATE WIFI and NCSA discussed the steps you can take to protect your personal information and how to respond if you become a victim of identity theft.
The ever-changing ways kids interact online has made it difficult for parents to keep pace with the latest safety and security advice. PRIVO, Savvy Cyber Kids, iKeepSafe, the FTC and the Center on Media and Child Health joined NCSA to discuss tips for parents and share resources.
To help understand how shoppers are behaving in their stores, retailers are contracting statistical modeling firms that collect and analyze data many shoppers may not even realize they're providing through their smartphones. The growth of the Mobile Location Analytics (MLA) industry has raised questions about the specific information being collected, how it’s being used, and to what extent, if at all, consumers are aware this is happening.
"Smiling feels easy and natural. However, this action is quite elaborate from a structural point of view," writes Jetico CEO Michael Waksman. "So the key to making data privacy more accessible would be to use software that allows encryption to be performed easily and naturally without even thinking about it."
David Hoffman was one of the driving forces behind the observation of Data Privacy Day in the United States and Canada in 2008, so it should come as no surprise Intel's global privacy officer delivered one of the most memorable comments of the 2014 Data Privacy Day Kickoff Event Jan. 28 at The Pew Charitable Trusts in Washington, D.C.
"For those who would frame data privacy as the individual-versus-corporations or individual-versus-government, there are more constructive approaches to protecting privacy than adversarial ones," writes NCSA executive director Michael Kaiser on the annual observation of Data Privacy Day. "And that's why the theme of Data Privacy Day is Respecting Privacy, Safeguarding Data and Enabling Trust."
"To avoid accidentally selling your identity on eBay or providing access to your bank accounts in the form of a broken tablet in the trash, you need to take secure measures to wipe the data clean," writes Frank Milia of IT Asset Management Group (ITAMG). "The good news is that many of the drive manufacturers have provided secure erasure utilities built into the disks."
In the last #ChatDPD before Data Privacy Day Jan. 28, iKeepSafe, SpiderOak, ISACA and the International Association of Privacy Professionals joined NCSA to discuss best practices for businesses regarding privacy ethics and good data stewardship.
SpiderOak's Chip Black takes a look back at Ted Nelson's seminal 1974 works on computing and how they're relevant as ever in online privacy discussions 40 years later.
"It's the start of a new year -- a time to look at our habits with fresh eyes, make positive changes and tackle life with renewed energy and enthusiasm," writes Linnette Attai of iKeepSafe. "It's also a great time to take a look at your digital footprint, and those of your children, and see if there are changes to be made there as well."
In the latest Twitter chat leading up to Data Privacy Day 2014, EDUCAUSE, AT&T, the Center on Media and Child Health and researcher Mary Madden from Pew Internet & American Life Project provided insight and tips about navigating the online world safely and securely, one privacy check-up at a time.
Heather M. Federman, Policy & Outreach Director at the Online Trust Alliance, provides her New Year "data resolutions" for businesses to open 2014.
The Rape, Abuse & Incest National Network (RAINN), Reputation.com and others from the victims' services community joined NCSA to share advice and resources that help survivors of domestic or sexual violence control their online presence in recognition of Data Privacy Day. This transcript has been edited for brevity and clarity.
Reputation.com's Leslie Hobbs covers how to create a positive personal and professional presence online. "The potential to make the Internet work for you exists," she writes. "it just requires a bit of legwork and a lot of thought."
Frances Henderson, CIPP, and Emma Fletcher, CIPP, deliver the second installment in the Council of Better Business Bureaus' series, "Privacy Basics for the Savvy Small Business", by discussing how companies should approach reviewing and updating their privacy policies.
"In the Digital Age, one way a victim can start to feel empowered again is through controlling her privacy," writes Reputation.com's Leslie Hobbs, who offers some guidance that anyone can use to guard their personal information.
Data Privacy Day and guests AT&T (@ATTSmallBiz), Private WiFi (@Privatewifi) and Application Developers Alliance (@AppsAlliance) discussed privacy on-the-go for individuals and small businesses during this second #ChatDPD.
In her second entry in the Data Privacy Day guest blog series, iKeepSafe's Linnette Attai expands on the conversation around data security and schools with a new paper that outlines concerns and serves as a guide for dialogue on assessing and implementing systems and practices.
Privacy specialist Andrew McDevitt of AvePoint explains why the global privacy community should rally around Data Privacy Day this January 28: to heighten public awareness of privacy concerns and promote strong data stewardship practices among individuals and businesses.
Private Wifi and the Identity Theft Resource Center have released a new infographic, "The Ultimate Guide to Staying Safe on Public Wifi", which offers insight into about the overall consumer privacy beliefs in WiFi hotspots.
David Dahl, director of development for the Crypton.io project at data encryption and storage service provider SpiderOak, provides the strategies he follows at home to maintain greater control over his online privacy.
"Smart companies - the ones that are looking not just one quarter from now or one year from now - are anticipating the rise of the New Privacy," writes Reputation.com's Leslie Hobbs. "So what should companies do to start down that path?"
Linnette Attai from iKeepSafe delves into the issue of how schools protect the student data they collect, and a new iKeepsafe resource, "Data Privacy and Schools: Outlining the Conversation." The paper is a launching pad for dialogue about how schools collect and manage student data, with the ultimate aim of easing the development of successful and compliant partnerships with third-party technology partners.
The open and increasingly social nature of the Internet offers big benefits, and big risks. Data Privacy Day hosted a Twitter chat Nov. 13 to talk about how you can share responsibly while protecting your personal information online. Guests included @STOPTHNKCONNECT, @iKeepSafe, and @Reputation_com.
"Sharing your personal data can very much color your reputation, especially online," says Leslie Hobbs of Reputation.com. "In fact, the two often go hand-in-hand so take a judicious approach to revealing your personal details. Here's how."
"Privacy advocates, regulators and others raise worthwhile concerns about the growing Internet of Things," writes guest blogger Jason Meyer. "What happens when the data these devices capture about us misrepresents us or include errors that skew our profiles?"
Every year on or around January 28, companies, nonprofits, schools and government agencies celebrate Data Privacy Day (DPD) by educating employees, customers and constituents about privacy. I hope you'll join us in recognizing Data Privacy Day in 2014. Now is the time to start planning how to make the most of DPD and show your commitment to respecting privacy, safeguarding data and enabling trust.
The National Cyber Security Alliance, the Office of the Information and Privacy Commissioner of Ontario, Microsoft Privacy, Intel, and Data Privacy Day discussed good data stewardship and privacy practices for your organization or business. The following transcript has been edited for brevity and clarity.
The International Association of Privacy Professionals (IAPP) hosted a KnowledgeNet forum, The Components of an Accountable Company Privacy Program and How to Implement It, in Washington, D.C. on Wednesday, June 26. The discussion was led by National Cyber Security Alliance board member David Hoffman (CIPP/US) and Chair of Data Privacy Day Dan Caprio.
Philip Alexander, founder of Data Privacy Network, offers advice on how you can protect your identity and personal information while on summer vacation.
Data Privacy Day's Tiffany Barrett provides updates on two major privacy campaigns under way in coming days: Privacy Awareness Week (April 28-May 4) and Choose Privacy Week (May 1-May 7).
Michael Waksman, CEO of Jetico, a company that provides military-standard data protection software to the U.S. Department of Defense, offers his tips on how exactly to make your passwords 'long and strong'.
As a user, if you have never taken Facebook's impact on your privacy, reputation and security seriously, it's now time to do so.
When you work with personal data on a Windows computer, your privacy and identity are at risk. We will show you a few basic things you should keep in mind, to make sure your privacy and identity are always protected.
We recently joined STOP. THINK. CONNECT., Holland & Knight, InfoSight, ISACA and the U.S. Department of Homeland Security for a Twitter chat about privacy & small business. Here's a partial transcript of the chat..
As businesses and organizations upgrade to the newest wireless devices, every day thousands of used mobile devices are being replaced and companies run the risk of inadvertently compromising confidential internal information contained on these devices.
Consumers today cannot avoid all risks, but there are a number of practical steps they can take to minimize the threats of viruses, credit card fraud and identity theft.
We joined STOP. THINK. CONNECT., Data Privacy Day, Intel, Matt Ivester for a Twitter Chat on Data Privacy Day. We also talked about Ivester's book, "LOL...OMG What Every Student Needs to Know About Online Reputation Management, Digital Citizenship and Cyberbullying." Here's a partial transcript.
Every day, kids face a myriad of online decisions- which friend requests to accept, whether to forward time-limited and self-destructing images (have you heard of Snapchat?), whether to talk to someone online they don't know, even whether to join classmates in bullying someone.
With the rise of big data come big challenges, including how to deal with increasingly challenging privacy issues. To help protect information, which has become the currency of the 21st century, here are 10 resolutions for your enterprise to adopt in 2013.
Data Privacy Day is approaching, and as part of our awareness campaign, we wanted to review some of the best practices for safe password selection and management. It is surprising but true that even in today’s security-conscious environment, the word “password” and the sequence “123456” remain some of the most common passwords!
We recently joined STOP. THINK. CONNECT. (@STOPTHNKCONNECT), Data Privacy Day (@DataPrivacyDay) and Reputation.com (@Reputation_Com) for a Twitter chat about privacy and online reputation ahead of Data Privacy Day (#dpd13), which is on January 28th. Here's a partial transcript of the chat.
Data Privacy Day is Just Around the Corner - Are You Respecting Privacy, Safeguarding Data and Enabling Trust?
Now that National Cyber Security Awareness Month has come to a close, we set our sights on another very important day. January 28th is Data Privacy Day.
The sky is the limit and that is what we are aiming for in 2013 for Data Privacy Day.
If anyone knows about the effect the Internet can have on a person's reputation, it's Matt Ivester.