The IAPP

Introduction In the business world today, many customers are submitting their private information and data to organizations. The most typical forms of this very often include Social Security numbers,... Go on to ...

How to Comply with the Red Flags Rule

| | Protecting Privacy
Introduction The Red Flags Rule, or RFR, is one of the identity protection rules found in the Federal Credit Reporting Act (FCRA). More specifically, RFR deals with protecting individuals from... Go on ...

Vendor Management and Privacy Compliance

| | Protecting Privacy
Overview It has become commonplace in today’s business world to use third-party vendors for certain tasks that would prove too difficult, time-consuming or resource-demanding to carry out... Go on to the site ...
Best Practices for the Implementation of the Privacy by Design Concept in Smart Devices

Best Practices for the Implementation of the Privacy by Design Concept in Smart Devices

Introduction Both the terms ‘Internet of Things’ (IoT) and ‘Privacy by Design’ (PbD) were coined back in the 90s. The original idea behind PbD is to weave privacy into the... Go on ...

Does the GDPR Threaten the Development of Blockchain?

| | Protecting Privacy
1. Introduction In the last two years, there has been a steady increase in the number of discussions around two important topics. Namely, the new EU law called the General Data Protection ...

GDPR Trolls

1. Introduction Patent trolls are not a new phenomenon. They buy patents for the sole purpose of extorting and suing companies. Since patent-related litigation proceedings are complex and... Go on to the ...
A Brief Guide to GDPR Compliance

A Brief Guide to GDPR Compliance

Introduction: What do you know about the GDPR? The European Union (EU) has a new data protection law – the General Data Protection Regulation (henceforth “the GDPR” or “the... Go on to ...

10 Things Employers Need to Know About Workplace Privacy Laws

Introduction In today’s fast-paced business world, a lot of job-related duties can be done virtually, or either in a brick and mortar office. Employees can use their Smartphones, social media... Go on ...

Secure Guardrails