privacy
Businesses Aren’t Ready for California’s Data Privacy Act
In The News:
Info-Tech Research Group in the News
A year and a half ago, the General Data Protection Regulation (GDPR) — the world’s most far-reaching data privacy regulation — came into effect across the European Union.
What You Need to Know About China’s Personal Information Protection Law
In The News:
Principal research director Alan Tang discusses what you need to know about China's Personal Information Protection Law in this CMSWire article.
What You Need to Know About China’s Personal Information Protection Law. in-the-news. Personal Information Protection Law Principal research director Alan Tang CMSWire article China customer-experience. Principal research director Alan Tang discusses what you need to know about China's Personal Information Protection Law in this CMSWire article.. Principal research director Alan Tang discusses what you need to know about China's Personal Information Protection Law in this CMSWire article: https://www.cmswire.com/customer-experience/what-y....
CyberTrend: Technologies to Watch in 2015
In The News:
NEW DEVELOPMENTS TO LOOK FOR IN THE YEAR AHEAD
Dave Cullinane, Cloud Security Alliance board member, for example, says leveraging big data analysis can grant organizations incredible insights into their customers and markets. Conversely, there’s potential “to raise significant privacy issues as consumer-buying data, for example, is aggregated and analyzed,” he says.
BetaNews: Mobile app developers, don't forget about privacy and security
In The News:
(27-Mar-2012) User experience is important when developing any mobile app but in an enterprise context, what about security? For example, if you are developing an app that stores personal information there are regulations that ask where this information resides. Depending on the industry,...
To ensure that you are in full compliance to any privacy, security or regulatory questions, it is recommended that apps be developed in-house or through a partner.
IT World Canada - This e-mail message will self-destruct in ...
In The News:
(25-May-10) Technology that promises highly secure, confidential and self-destructing messages over the Internet isn’t only available to top secret intelligence agents. Chicago, Ill.-based VaporStream Inc., which released its first demo of the VaporStream non-documentable e-mail service in...
VaporStream gives users the privacy and confidentiality they would expect when they are not online, said Joseph Collins, president and CEO of VaporStream. “Unfortunately, we live in a world where everything you do online is recorded,” he said. Collins likens VaporStream to a phone conversation.
ITBusiness - Lax privacy rules get Google off the hook
In The News:
(29-Oct-10) Weaknesses in privacy legislation both in Canada and the U.S. helped Google escape with a mere slap on the wrist over the StreetView WiFi snooping snafu, according to tech and privacy experts. The U.S. Federal Trade Commission, on Wednesday said it has closed its investigation...
The U.S. Federal Trade Commission, on Wednesday said it has closed its investigation into the matter and has back off further privacy breach investigation of the search engine. Jennifer Stoddart, Canadian privacy commissioner, earlier said Google StreetView cars had downloaded much more than they had intended.
Data Privacy and Data Security Are Not the Same
In The News:
Ever since the September 2017 Equifax data breach that exposed the personal information of 147 million Americans, and the many other high-profile data breaches that have happened since, data security and data privacy have become pressing boardroom-level concerns.
Ever since the September 2017 Equifax data breach that exposed the personal information of 147 million Americans, and the many other high-profile data breaches that have happened since, data security and data privacy have become pressing boardroom-level concerns."
IT Business: Data Encryption Seldom Used by Canadian Businesses
In The News:
(13-May-2012) Nearly half of Canadian businesses that handle customers' personal information in digital form fail to use appropriate tools and practices to protect sensitive data, according to a survey commissioned by the Office of the Privacy Commissioner of Canada. In a poll that covered...
(13-May-2012) Nearly half of Canadian businesses that handle customers' personal information in digital form fail to use appropriate tools and practices to protect sensitive data, according to a survey commissioned by the Office of the Privacy Commissioner of Canada.
Cyber Experts Weigh-In on Oracle's Big TikTok US Operations Challenge
In The News:
Cyber Experts Weigh-In on Oracle's Big TikTok US Operations Challenge
ITBusiness - Why you need to manage smartphone security risks
In The News:
(22-Jul-10) Although there aren't any prevalent security attacks or threat mechanisms associated with smartphones in the market today, security vendors and analysts are urging mobile device users to use security best practices on them, just as they would with their computers. With recent...
However, although he said using these types of devices are “generally safer than PCs because malware can't run on them,” there are still privacy and data risks to be aware of.
CRM Magazine - Geolocation: Advertising's Future or 1984 Revisited?
In The News:
(01-Jun-11) Airstrip One, Oceania, the setting of George Orwell’s science fiction novel 1984, was once considered unrealistic and even ridiculous. Constant war plagued the imaginary province, and the government manipulated its citizens with mind control tactics and public surveillance. In fact,...
In fact, privacy did not exist, and many people lived in seemingly bizarre apartments furnished with two-way telescreens, allowing for a true big brother-esque way of life. The telescreens also were found in workplaces and other public spots, along with hidden microphones to pick up all conversations.
Federal Computer Week: Agencies seek to secure mobile access to government network resources
In The News:
(6-May-2012) In one corner are government executives who want more flexible, mobile computing options that allow access to the data and applications needed to perform their jobs and deliver government services. In the other corner are government IT administrators, who are focused on meeting...
Contact Tracing Apps Resurgent After Early Success for Google and Apple’s Design
In The News:
After a false start based on poor software design, mobile apps for contact tracing are relaunching around the world with a privacy-first approach, and there is early promise out of Europe that these apps could make a difference in the war against COVID-19.
After a false start based on poor software design, mobile apps for contact tracing are relaunching around the world with a privacy-first approach, and there is early promise out of Europe that these apps could make a difference in the war against COVID-19.In Ireland, Germany, and Switzerland, the first contact tracing apps based on Google and Apple’s Exposure Notification System (GAEN) have been publicly available for several weeks.
CDN - Know when to hold it, know when to Shred it
In The News:
(23-Feb-11) Data that is most likely to be stolen are information that has the highest commercial value, according to James Quin, lead research analyst for Info-Tech Research Group in London, Ont. He said information typically falls into two buckets – intellectual property and...
Computer Power User: Authentication Times Two
In The News:
Double Down On Your Security With Two-Factor Authentication
Small Business Computing - 10 Cloud Computing Security Tips for Small Businesses
In The News:
(8-Mar-11) Cloud computing can represent a net gain in data security and system reliability – especially for small businesses with aging computers and data stored on hard drives that rarely -- if ever -- experience a back up. But that doesn’t mean you can take security and reliability for...
Top 5 Hidden Risks for CIOs
In The News:
The media is awash with stories of advanced persistent threats and privacy breaches, but at least they’re well understood. For many CIOs, the really disturbing risks may be the ones that aren’t as obvious. Real Times asks several experts about the hidden risks that should be keeping CIOs up...
The media is awash with stories of advanced persistent threats and privacy breaches, but at least they’re well understood. For many CIOs, the really disturbing risks may be the ones that aren’t as obvious.Real Times asks several experts about the hidden risks that should be keeping CIOs up at night..
IT World Canada: Canadian Security companies 'overconfident' in data security: study
In The News:
If you ask Websense Inc. whether most Canadian companies are as secure as they think they are, the answer is a resounding no. According to a study commissioned by the San Diego, Calif.-based software firm, the vast majority of those interviewed as being confident in their security policy and...
According to a study commissioned by the San Diego, Calif.-based software firm, the vast majority of those interviewed as being confident in their security policy and technology, a confidence that is misplaced, the company says.The reason Websense is most concerned is that a large portion of the data lost, as reported in the survey, was accidental.
Global Delivery Report: Do Outsourcers "Make-Up" Work?
In The News:
(28-Feb-2012) A much-overlooked statistic from a report released in the summer of 2011 shows how deep the trust and communication gap can be between a service provider and a customer. Based on an anonymous survey of nearly 500 IT professionals, Lieberman Software found that more than three...
Attempts via social media, Lieberman Software, and the analyst community to come up with specific examples met with no success. . (28-Feb-2012) A much-overlooked statistic from a report released in the summer of 2011 shows how deep the trust and communication gap can be between a service provider and a customer.
IT World Canada: Province of Ontario's social media policy evolves
In The News:
Four years after it banned the use of Facebook, YouTube and similar tools by employees, the government is figuring out how to strike an appropriate balance between flexibility and risk management Social media is like any other tool in a company’s marketing arsenal: It can bolster brand...
Filter by Content Type
- All Results
- Note (291)
- Software Reviews (142)
- Blueprint (44)
- Tech Note (31)
- Video (30)
- Templates And Policies (29)
- Tool (24)
- Live Webinar (17)
- Diagnostic (14)
- In The News (14)
- Academy Course (11)
- Industry (11)
- Job Description (1)
- Knowledge Base (1)
- Press Release (1)
- Research Center (1)