Free tools and resources for Data Protection Officers!

Tag Archives for " IT "

Latest papers on privacy and data protection – May

Kaleidoscope on the Internet of Toys

Report by the Joint Research Centre (JRC) on safety, security, privacy and societal questions emerging from the rise of the Internet of Toys – “Internet Connected Toys that constitute, along with the wave of other domestic connected objects, the Internet of Things”.

Read report

Who Watches the Watchers?

Report from Citi GPS: Global Perspectives & Solutions on how consumers are tracked, and how the data that is collected and analyzed, and how consumers feel about that.

Read report

Practical Guide to Efficient Security Response

Whitepaper on data breaches with proposals how to decrease response time. It includes seven security operations capabilities you need, a handy checklist to evaluate your security operations capabilities, and best practices for efficient security response.

Download whitepaper

Assessing Mobile App Data Privacy Risk

paper on mobile-risk scoring and how to do that in practice. It was carried out by IAPP and Kryptowire and is based on input of 400 privacy professionals.

Read summary of paper

UN Report on Governmental Surveillance

UN Special Rapporteur on the Right to Privacy, Joseph Cannataci, presented his report on governmental surveillance and access to personal data from a national and international perspective.

Read report

How  to Talk About the Right to Privacy at the UN

A brief guide on United Nations stand on privacy. Guide is prepared by Privacy International.

Read guide

Be Compromise Ready: Go Back to the Basics. 2017 Data Security
Incident Response Report

Survey on data security and incident response trends, and how to minimise data breach risks.

Read survey

Annual Report of the Data Protection Commissioner of Ireland

Annual report of the Data Protection Commissioner of Ireland for yer 2016.

Read report

Certifications, Seals and Marks under the GDPR and Their
Roles as Accountability Tools and Cross-Border Data Transfer
Mechanisms

Discussion paper on Certifications, seals and marks under the GDPR prepared by Centre for Information Policy Leadership. It looks at regulation provided in GDPR and benefits of such mechanisms.

Read paper

Silent revolution of passwords?

The problem now is wide reuse of the same password for different services, as it is much easier for people  than to remember tens of different passwords. However, reuse of passwords may lead to bad consequences – hack of one account may allow attacker to accesses also other accounts. Reuse of passwords was reason for recent Dropbox hack.

So this little known company is going to reveal us from passwords hell and bring revolution in authentication.

Full article

Privacy in cloud – findings

Privacy and services in cloud is a hot topic now. With GDPR now adopted some are afraid that new privacy regulation in Europe will kill the cloud quickly. Although it is doubtful cloud services will cease to exist because of regulation nevertheless compliance with privacy and data protection regulation will leave an impact. Therefore it is no surprise two big law firms – Eversheds and Baker & Mckenzie – recently published their reports on cloud services.

Continue reading »

Cryptopolitik and the Darknet

An essay about encryption, regulation, their past and future.

Encryption policy is becoming a crucial test of the values of liberal democracy in the twenty-first century. The trigger is a dilemma: the power of ciphers protects citizens when they read, bank and shop online – and the power of ciphers protects foreign spies, terrorists and criminals when they pry, plot and steal. Encryption bears directly on today’s two top threats, militant extremism and computer-network breaches – yet it enables prosperity and privacy. Should the state limit and regulate the fast-growing use of cryptography? If so, how?

Read full essay here: Cryptopolitik and the Darknet

>