POPULARITY
John McVeigh Today, we have a guest post on the complexities of navigating Brexit and GDPR for companies on both sides of the border- provided by ASSUREMORE. ASSUREMORE is a management consultancy business specialising in GDPR compliance - founded by John McVeigh. To find out more about ASSUREMORE and the services they provide, please click here. When the General Data Protection Regulation (GDPR) came into force in 2018, it applied uniformly to all EU member states - including the United Kingdom and the Republic of Ireland. However, Brexit changed the game. We now have two parallel regimes: The EU GDPR applies to any organisation operating in the European Union. The UK GDPR applies to businesses operating in the United Kingdom. Although the laws are nearly identical in principle, they are legally separate. This means that if you're based in one jurisdiction but process personal data from the other with no local base, you may need to appoint a GDPR representative there. It's a requirement that many businesses are unaware of or have overlooked, despite it coming into effect as soon as the UK fully left the EU. "Two Versions of GDPR" in Practice "Essentially, there are now two versions of GDPR," explains John McVeigh. "If your business is based in only one jurisdiction but still handles personal data from the other, you'll likely need a representative. It's something that was never really spotlighted when Brexit happened - and it catches people out." Before Brexit, a company in Northern Ireland selling services to the Republic of Ireland (and vice versa) faced no additional compliance beyond standard EU GDPR. Once the UK left, businesses in the Republic effectively became "outside" of UK legal territory, and businesses in Northern Ireland or Great Britain likewise became "outside" of the EU's legal territory. As a result, many organisations - large or small, B2C or B2B - now come under Article 27 of the respective GDPR regime. When Do You Need a GDPR Representative? Under Article 27 (EU GDPR or UK GDPR), a non-EU or non-UK organisation that processes the personal data of individuals in the other territory may need to appoint an official GDPR representative if: You do not have an "establishment" (e.g. an office, subsidiary, or physical presence) in the territory where your customers or data subjects reside. You are offering goods or services to individuals in that territory (even free services can count). You process personal data that can identify living individuals (for instance, storing "joe.blogs@companyx.com" rather than simply "info@companyx.com"). If all your data is strictly non-personal (like a generic info@ address or purely anonymous records), or if your activity in the other jurisdiction is truly "occasional" and poses minimal risk, you might be exempt. However, genuine exemptions are rare in practice, especially for consumer-facing businesses or those storing personal details of clients, suppliers, or leads. B2C vs. B2B B2C: Businesses selling directly to consumers in the other jurisdiction face the highest scrutiny - especially if they store names, addresses, payment details, or marketing preferences of private individuals. Consumers are more likely to exercise data protection rights and file complaints if they feel their privacy is being mishandled. B2B: Even if you primarily serve other companies, you typically store personal data for key contacts - e.g. "john.smith@clientcompany.com" - which means GDPR still applies. The risk of complaints may be somewhat lower, but the legal requirement remains. The Cross-Border Example A classic scenario is a manufacturer or retailer in the Republic of Ireland that has always sold products seamlessly into Northern Ireland or Great Britain. Suddenly, that same business is deemed "non-UK" for data protection purposes - even though physically they might be only kilometres away across the border. If they do not have a dedicated office in the UK, they will likely need a UK GDPR r...
Lawgical with Ludmila Yamalova The post Navigating UAE Data Privacy Laws: Facial Recognition Technology with Comparisons to EU GDPR first appeared on LYLaw Dubai.
In this episode of the Knobbe IP+ podcast, Knobbe Martens partner Mauricio A. Uribe speaks with European Patent Attorney and Ph. D. Hanane Fathi Roswall on the recently adopted EU AI Act. Similar to the EU GDPR, the EU AI Act will soon begin entry into force and has the potential to affect companies on a worldwide basis. Mauricio and Hanane explore the current state of the EU AI Act and the specifics of the regulatory impact on companies. In-house counsel and compliance officers will gain valuable insights into the timing of adoption, key terms for scope and compliance, and enforcement mechanisms. Mauricio and Hanane also discuss how companies with plans to go to market in the EU, or those already selling products in the EU, can prepare themselves for compliance with the new law. Listen to the episode here or read the full transcript here.
In this week's Social in Six, we're talking about Meta's ad-free answer to new EU GDPR regulations, LinkedIn deleting several post types including carousels, and YouTube's big plan to have you see more Shorts. We also discuss X's continued throttling of external links, Meta's commerce partnership with Amazon, and Threads' long-awaited arrival in the EU (complete with a new feature). G ot a question or suggestion for the Social Minds podcast? Get in touch at socialminds@socialchain.com.
Key Definitions in India's Digital Personal Data Protection Bill are Explained in this episode. India recently passed its Digital Personal Data Protection Bill, and in this episode, twelve key definitions from the bill are discussed. These include data principle (similar to EU GDPR's data subject), child (defined as anyone below 18 years of age), data fiduciary (similar to EU GDPR's data controller), data processor (same as EU GDPR), person (individuals, companies, etc.), data protection officer (only required for significant data fiduciaries), personal data (similar to EU GDPR), personal data breach (similar to EU GDPR), processing (any operation performed on personal data), public interest (elements/activities that lead to security and other threats), consent manager (a new term for intermediaries or third parties/brokers) and digital office (a privacy office). You can listen to The FIT4PRIVACY Podcast conversations at Anchor, iTunes, Stitcher, and Spotify... And, you can also watch the video version on YouTube. Listen or watch the podcast and share your comments on what you think. --- Send in a voice message: https://podcasters.spotify.com/pod/show/fit4privacy/message
The role of a Data Protection Officer (DPO) has been well-known under data protection laws in Europe, currently under the EU GDPR, and prior to that, the EU Data Protection Directive. The role goes as far back as the 1970s, however, despite its established history, numerous questions continue to revolve around the responsibilities of a DPO. Scott Loughlin, co-lead of the Hogan Lovells Privacy and Cybersecurity practice, sits down with Hogan Lovells partner Christian Tinnefeld to discuss the ever-evolving role of a DPO and provide some practical tips for those serving in the function.
In this episode of the Future of Application Security, Harshil speaks with Anthony Ungerman, VP Product Security at Avalara, a tax software company. They discuss what product security encompasses beyond application security, how the security team at Avalara works with engineers, and how they articulate business value to increase security implementation. They also discuss security automation, approaches for security training, and what's in store for the future of product security. Topics discussed: The evolution of Anthony's career as a "lifelong computer junkie," including how he was introduced to security, and how he learned security by practicing on his kids' web traffic. How Anthony defines product security, why it's broader than application security, and what it encompasses. How Avalara's security team works with the engineering team, and how they leverage security champions to implement security initiatives. How security-mindedness is expanding, from the boardroom to customers, prompted by data privacy regulation like EU GDPR and the edicts from the White House. How to get more security buy-in by being able to explain how initiatives tie back to business objectives. A summary of articles Anthony wrote about how to automate application security programs. What types of training they're offering to ramp engineers up on security best practices — and what consequences are in place if they don't complete training. How the future of product security will be shaped by privacy regulations, generative learning, and all-encompassing dashboards.
India's Data Protection Regime with Supratim Chakraborty and Punit Bhatia in FIT4Privacy Podcast E083 S4 GDPR. Will India have a similar law? Well, India's Data Protection Bill has been under consideration since 2018. When can we expect it? Supratim shares his inputs and experience about India's data protection regime and how similar (or different) would it be from EU GDPR. KEY CONVERSATION POINTS The Data Protection Regime Bill in India What is society's perspective on the new bill? Are Indian Companies Ready for the Big Shift? How Much Time For Implementation? Will the EU Provide Adequacy Decision to India? How about Skills and Manpower for compliance? What can you do as a business already? ABOUT THE GUEST Supratim leads the Privacy and Data Protection practice of Khaitan & Co and is considered a thought leader in this space in India. He has advised eminent clients in relation to information technology laws in India, including data privacy, cyber security, and internet intermediaries-related issues. Supratim is very active in the technology-related policy space. He was amongst the select few individuals in the country from whom the Ministry of Electronics and Information Technology (MeitY) had specifically sought additional comments on aspects pertaining to the erstwhile draft Personal Data Protection Bill. Supratim also spearheaded key stakeholder consultation/ feedback sessions organized by prominent industry associations in relation to the same. Supratim's views had also been sought by the National Commission for Women (Government of India) regarding cybercrime against women and changes in laws required to address the issues. Further, he has advised a prominent industry association on submission relating to the Expert Committee Report on Non-Personal Data Governance Framework. Supratim actively collaborates with industry associations such as the US India Business Council and the Digital Lending Association of India on submitting representations and feedback on key legislative and policy initiatives of the Indian Government. Aside from national-level policy initiatives, due to his thought leadership in the data privacy space, Supratim was also invited to Bangladesh by ‘Bangladesh Association of Software and Information Services' (BASIS) to provide inputs to lawmakers there for preparing their data protection law. He is also regularly invited to eminent forums to speak on the subject and is quoted frequently in leading national dailies. As one of India's leading data privacy lawyers, he is ranked as a “Leading Individual” for 3 consecutive years for data protection by The Legal 500 Asia Pacific 2021, 2022 and 2023. Under his leadership, the firm has been awarded “Data Protection Law Firm of the Year” by ALB India Law Awards for two consecutive years, 2021 and 2022. Supratim is also the recipient and exclusive winner of Lexology's “Client Choice Award” 2022 for Data Protection. Supratim is a member of ASSOCHAM's National Council for FinTech, Digital Assets, and Blockchain Technology. Supratim holds a GDPR FAS Certification and DPO Certification. ABOUT THE HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organizational culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentoring and coaching privacy professionals. Punit is the author of books “Be Ready for GDPR” which was rated as the best GDPR Book, “AI & Privacy – How to Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured among the top GDPR and privacy podcasts. --- Send in a voice message: https://podcasters.spotify.com/pod/show/fit4privacy/message
Data privacy is one of the trendiest topics in the technology industry today. With the humongous amount of personal and sensitive information being stored and shared online, it is becoming increasingly important to ensure that this information is protected. Moreover, with the launch of the EU-GDPR in 2018 and other data privacy laws and regulations, businesses across the globe have become compelled to make data privacy and security a priority. A career in data privacy can offer individuals a rewarding and challenging opportunity to make a real difference. This article will provide a closer look at what a career path in data privacy entails, what skills and qualifications you will need to succeed, and what the future of this field might hold. Whether you are just starting or looking to make a switch, this guide will provide valuable insights and advice to help you pursue a successful career in data privacy. What are data privacy professionals? First of all, let us understand what data privacy professionals are. Data privacy professionals are experts who specialize in protecting sensitive and personal information from unauthorized access and use. They help organizations implement best practices for data privacy and security, maintain compliance with privacy laws and regulations, and conduct risk assessments to identify potential privacy threats. They also advise on privacy-related issues, develop privacy policies and procedures, and manage data breaches. They ensure that organizations are taking the necessary measures to secure their data and protect the privacy of their customers and employees. View More: Career Path For A Data Privacy Professional
Unleash the Power of a Thriving Career in Privacy with Insights from a Legal PowerhouseJoin us as we delve into the world of privacy law with one of the industry's top voices and uncover the secrets to a successful career pivot.Hi, my name is Jamal Ahmed and I'd like to invite you to listen to this special episode of the #1 ranked Data Privacy podcast.In this episode, be prepared to:Master the art of creating privacy awareness in your organisation and beyondTransform into an action-taker and conquer the fear of failureDiscover the key to making your privacy trainings unforgettable and impactfulIt's an episode you can't afford to miss!Karollayne is a Brazilian Lawyer and an active member of the Brazilian Bar Association for privacy and data protection in her state.She has her own office called Dias Marinho & Coelho Advogados where she works with the Brazilian GDPR (LGPD) and EU GDPR by delivering consulting services and providing awareness training to help build a privacy culture inside different organizations.Follow Jamal on LinkedIn: https://www.linkedin.com/in/kmjahmed/Follow Karollayne on LinkedIn: https://www.linkedin.com/in/karollaynemarinho/Take your career to the next level with The Privacy Pros Ultimate CIPPE Certification Programme: http://bit.ly/3ZmiJZzGet Exclusive Insights, Secret Expert Tips & Actionable Resources For A Thriving Privacy Career That We Only Share With Email Subscribers► https://newsletter.privacypros.academy/sign-upSubscribe to the Privacy Pros Academy YouTube Channel► https://www.youtube.com/c/PrivacyProsJoin the Privacy Pros Academy Private Facebook Group for:Free LIVE TrainingFree Easy Peasy Data Privacy GuidesData Protection Updates and so much moreApply to join here whilst it's still free: https://www.facebook.com/groups/privacypro
Episode Summary Host: Curtis File, Editorial Manager, ESG and Sustainable Finance Featuring: Melissa Hudson, Associate Director, Research Products Liam Zerter, Associate Director, Quantitative Research Manager In this episode of the Sustainalytics Podcast, Curtis explores cybersecurity and data privacy issues, with commentary from Melissa Hudson and Liam Zerter about the real impact of cyberattacks on businesses. You'll learn about the 2021 United Kronos Group ransomware attack, cybersecurity trends that organizations should monitor, how cyberattacks affect the bottom line, and why companies should invest in developing robust cybersecurity and data privacy policies. The Current Cybersecurity and Data Privacy Trends Companies Should Monitor Within the last two years in particular, both the frequency and severity of cyberattacks against businesses have continued to climb. As companies have modernized and expanded their digital infrastructure to remain competitive, they have also increased their vulnerability. High-profile data breaches have led to increased pressure from regulators, consumers, and the insurance industry, who increasingly view such incidents as market failures. Why Having a Strong Cybersecurity Policy is Important Perhaps most importantly for a company's bottom line, Morningstar Sustainalytics' researchers found that companies that had robust data privacy and cybersecurity policies were able to recover faster from a cyberattack compared to peers with poor or weak policies. Beyond providing a boost to recovery, companies must also invest in their cybersecurity infrastructure in order to keep up with the rapidly changing regulatory landscape. Those that don't take immediate action will be left behind. Read Our eBook, Data Privacy, Cybersecurity and ESG: Managing Risks in a Changing Business Environment Download the ebook to learn about the types of data privacy and cyber threats companies are facing, the potential ESG risks for companies that do not properly address data privacy and security, and how organizations can manage and mitigate data privacy and security risks. Key Moments 00:00 United Kronos Group Ransomware Attack 01:54 Introduction to the Cybersecurity and Data Privacy Landscape 03:35 Five Global Events Driving Cybersecurity and Data Privacy Trends 05:18 Consequences of Under-Investment in Cybersecurity 06:40 The Increasing Frequency and Severity of Cyberattacks 08:00 How Cyberattacks Impact Stock Price 09:45 The Importance of Strong Data Privacy and Cybersecurity Policy 10:34 A Developing Regulatory Landscape 12:09 Looking Forward Transcript 00:02 Curtis File: In December 2021, a group of cybercriminals sent panic across the United States. United Kronos Group, a payroll and HR software company, was targeted by a ransomware attack. The attack took out its Kronos Private Cloud platform, and this left major retailers and state governments scrambling to pay employees as the holidays approached. But worse, a number of hospitals were affected. Kronos was a mission critical provider of administrative services for hospitals across the United States. From small, remote hospitals to urban medical systems, the attack interrupted services and, in many cases resulted, in delayed health care delivery. So why was this able to happen? 00:46 John Riggi: In response to the pandemic, hospitals rapidly deployed and expanded network-connected and internet-connected technologies to accommodate a surge of COVID patients and a remote administrative workforce. So, what this did is create many more opportunities for bad guys to penetrate our networks. It's what we call an expanded attack surface.1 01:18 CF: That was a clip of John Riggi, Senior Adviser for cybersecurity and risk for the American Hospital Association. At the time of the Kronos attack, he spoke openly to media about his concern for the cybersecurity threats the health care industry is facing. He told NPR: “As we always do, hospitals and health systems will get it done and care for patients, but under additional stress and burden they don't need right now.” The incident highlighted the real impact of cybersecurity breaches when corporations and government systems are attacked, our coworkers, friends and family are the collateral damage. I'm Curtis File, Editorial manager with Sustainalytics and your host for today as we look at cyberattacks and what they mean for ESG risk management. Cybersecurity and data privacy have become hot button issues, particularly in the last two years. Consumers have become more informed about data privacy issues, demanding companies take accountability for how they process user data. At the same time, there's been a significant increase in the number and severity of cyberattacks against businesses. To better understand the concrete business impact of cyberattacks, Sustainalytics' experts set out to create a report based on our own research and data, asking, “does a major cybersecurity incident have a meaningful impact on stock price returns?” And it turns out... 02:45 Melissa Hudson: The answer is yes. 02:47 CF: That's Melissa Hudson, Associate Director, Research Products and one of the authors of the report. You'll be hearing more from her today, along with another Sustainalytics expert, Liam Zerter, Associate Director, Quantitative Research Manager. We'll be taking a closer look at the results of the report to get a better understanding of cybersecurity and data privacy. But before we get into the data in numbers, let's take a broader look at cybersecurity as an ESG risk. Melissa Hudson explains. 03:15 MH: If I could sum up what we're seeing, it's that both data and digitization have become a double-edged sword. They are key drivers of value and efficiency, but they also create a significant new target commodity and increased corporate vulnerability. We see five recent global events as key. First, COVID 19 and the unprecedented disruption and movement to remote work that came with it. Second, the 2020 SolarWinds attack, a game changer that Microsoft CEO called the largest and most sophisticated attack the world has ever seen. Then came the 2021 Colonial Pipeline hack that showed the U.S. public the real-life, real-time impact of a cyberattack on critical infrastructure. Fourth, the Russian invasion of the Ukraine earlier this year, which led many to fear the possibility of cyber warfare. Finally, over the course of this time-period, we've seen the emergence of ransomware and in particular its productized form known as “ransomware as a service”. So, on the one side, disruption, sophisticated technologies, supply chains and critical infrastructure attacks are placing an increased focus on how vulnerable our integrated cyber ecosystem has become. While, on the other, ransomware is leveling the playing field in terms of risk. Companies and industries once considered immune are having to deal with business interruption and extortion as ransomware is made available to less sophisticated actors. In short, we're reckoning with a significant realignment in global cyber security risk. And the pace of corporate investment in cybersecurity has not kept up. 05:29 CF: That underinvestment in cybersecurity is a critical issue. The frequency of cyberattacks only continues to climb, and so does the severity of losses. As a result, stakeholders are being taken off guard as they're suddenly confronted with significant transition risks. And the public costs of underinvestment in cybersecurity are increasingly being viewed as market failures in much the same way as environmental issues. These costs are driving increased regulation, stronger enforcement, and pressure from the insurance industry. 05:59 MH: Marsh and McLennan see an inflection point in the market comparable to that faced by property insurers 30 years ago following Hurricane Andrew in Florida. Following Andrew, almost a million policyholders lost coverage after their insurance companies went bankrupt. In today's context, we are seeing a cyber-insurance market with increasing premiums, more exclusions, and, in a signal that mirrors our own analysis, coverage availability tightly linked to implementing industry standard cybersecurity safeguards. 06:40 CF: With regulators and insurers increasingly scrutinizing companies' cybersecurity practices. Sustainalytics researchers wanted to know: Are cybersecurity incidents really increasing in number and severity? Do cyberattacks impact share price? And if so, how? And do strong privacy and security practices pay off? Let's start with the first question. Liam Zerter has the answers. 07:03 Liam Zerter: Let's take a look at the data privacy and security incidents that Sustainalytics tracks. If we take a look at 2013, moving to 2021, data privacy and security has been growing at a cumulative aggregate growth rate of 37%. If you compare this to the total incident growth rate, which is influenced by a coverage, that's been growing at 24%. We have a pretty clear double-digit growth that's occurring. But the more interesting story is when you look down at the risk level from before 2018 and post 2018. So, from 2013 to 2017, those high-risk business incidents have been going for about an average of, you know, five per year. But in 2019 to 2021, now you're averaging 26. So, you're looking at what might be a 5x increase and those big write tail events occurring. 08:00 CF: To get a better understanding of what that fivefold increase in incidents means, Sustainalytics researchers put together an event study to look at the price reaction to news of a major cyberattack. They compared a portfolio of companies that had been involved in a high-risk cybersecurity incident against the S&P 500 and a global sector benchmark. 08:20 LZ: From day zero going forward, in the first four days, you have a -2.3% drop in the first four days and a partial rebound. Some companies start getting some confidence back in the market, but this is short lived. The absolute bottom that occurs is 60 trading days in. This is particularly interesting because some analysts and news anchors on BNN Bloomberg for example, will actually reference that, if a big controversy happens to a company, you know, wait three months and sometimes the market forgets about that controversy, even occurring. That's very interesting to see that this also aligns to that type of saying. 09:06 CF: But that's not the end of the story. The real surprise for researchers came when looking at the long-term impact. One year later. 09:14 LZ: The incident portfolio is actually still negative in absolute terms returns. But it's even worse off when compared to the S&P 500 and the sector benchmark. Now we have a scenario where, you know, it's clearly showing that there is a drag being placed on these companies for a longer-term period. Some studies may, that are out there, may actually say it could take up to two years for some companies that have been severely cyber attacked to start acting normal again. 09:45 CF: The reports are bleak. Malicious actors don't just deal from corporations, they damage the relationship between companies and their stakeholders. So, what can companies do to protect themselves? Liam says having robust security and data privacy policies can buffer the negative impact. 10:02 LZ: When we looked at data privacy and security policy management scores, those companies that had really strong scores, 75 to 100, 1 year after the incident actually traded pretty close in line with their relative benchmark. They actually weren't affected all too much in most cases. But those companies that had a score of zero or no score available at all because the industry that they participate in, they were down nearly -5%. So, there's a significant gap difference. 10:34 CF: Beyond providing a boost to recovery, the regulatory landscape is changing. Taking a casual approach to cybersecurity and data privacy is no longer an option. New and stricter data privacy regulations are on the horizon, with many nations looking to the EU GDPR as an example. On the cybersecurity front, laws, design requirements and reporting standards are continually evolving. Melissa says organizations must pay close attention to both data privacy and cybersecurity regulations to ensure they maintain compliance. 11:05 MH: In general, we're seeing a broad convergence towards GDPR-like regulatory regimes, at least in the developed world. California's New privacy laws have set a high bar for the U.S. and the majority of states now have their own. Canada, for example, is in the process of amending the breadth and depth of its privacy law to meet or closely aligned with GDPR standards. While Australia has just greatly increased the fines for privacy breaches in light of at least two major incidents. On the cyber security front, we have also begun to see significant developments related to freestanding cybersecurity law, technology design requirements, and increasing attention to critical infrastructure standards and reporting. A trend that has only accelerated with the SolarWinds and Colonial Pipeline attacks. 12:09 CF: Those attacks have highlighted that as a society, we have greatly underestimated cybersecurity risk. While digitization has made it easier for businesses to scale and operate more efficiently. It's also made it easier for malicious actors to exploit vulnerabilities—as demonstrated by the Kronos attack. Going forward, organizations are going to be facing increased pressure and scrutiny from government regulations, the insurance industry and stakeholders conducting due diligence on cybersecurity risks. As a result, companies are going to have to both increase their investment in cybersecurity, and increase their level of disclosure around risk mitigation, with particular attention to controls related to privacy and security management. Companies that failed to do so may ultimately face operational and remediation costs, financial penalties, reputational damage and lost business. That's it for this episode of the Sustainalytics podcast. If you'd like more information about data privacy and cybersecurity threats companies are facing around the world, and how your company can better manage these risks, head over to the resource center at www.sustainalytics.com and read our e-book Data Privacy, Cybersecurity and ESG: Managing Risks in a Changing Business Environment. We'll put the link in the show notes. Alternatively, you can check out the full report, The Impact of Cyberattacks on Stock Prices authored by Melissa Hudson and Liam Zerter. Or watch their in-depth webinar Cyber Attacks, Corporate Exposure and Material ESG Risk. If you have any questions, or suggestions for topics you'd like to learn more about, email us at podcast@sustainalytics.com. Thanks again to Melissa and Liam for providing their insight. And thank you for listening. References 1. CyberMed Summit. “Cyberattack Preparedness and Hospital Readiness Across American Healthcare.” YouTube Video, 22:37. February 6, 2022. https://www.youtube.com/watch?v=0gfSxfHSzzI
Let us talk about privacy legislative landscape in the US and talk about the developments on federal privacy law while comparing it the EU GDPR. This is an extract from the full episode of The FIT4PRIVACY Podcast. If you like this, you would enjoy the full episode. If this is your first time, the FIT4PRIVACY Podcast is a privacy podcast for those who care about privacy. In this podcast, you listen to and learn from industry influencers who share their ideas. The episodes are released as audio every Wednesday and video every Thursday. If you subscribe to our podcast, you will be notified about the new episodes. And, if you have not done it, write a review and share this with someone who will benefit from this. RESOURCES Websites: www.fit4privacy.com, www.punitbhatia.com Take advantage of our Free GDPR training: https://www.fit4privacy.com/course/free Blog www.fit4privacy.com/blog Podcast www.fit4privacy.com/podcast YouTube http://youtube.com/fit4privacy Email hello@fit4privacy.com --- Send in a voice message: https://anchor.fm/fit4privacy/message
US Privacy Act is in process. Named “ADPPA” or the “American Data Privacy and Protection Act”, it is still in Congress. We speak with Brandon to understand the differences between the EU GDPR and the ADDPA. Want to know more? Take a listen now. KEY CONVERSATION POINTS 00:00:00 Intro 00:01:32 GDPR in one word – “PROGRESSIVE” 00:02:20 Privacy Journey of Brandon 00:03:50 Privacy Tech or Cyber-tech Landscape in the US 00:06:08 Will ADPPA be a law in the future? 00:12:24 Challenges lie ahead in the progress of ADDPA 00:15:14 Frame Work Approach? 00:24:03 ADDPA into LAW 00:26:58 Fun Question: EU or US Regime? 00:32:59 Thank you ABOUT THE GUEST Brandon Pugh is a Senior Fellow and Policy Counsel for the R Street Institute's Cybersecurity and Emerging Threats team. He focuses on data security and privacy, local and state cyber, and military cyber, among other areas. Outside of R Street, he serves as an international law officer in the U.S. Army Reserve and on several boards, including a governor's advisory council. Prior to R Street, Brandon was legislative counsel for the NJ General Assembly Minority Office, where he handled nearly all legislation on cybersecurity, privacy, and emerging technology. He also served as a fellow with the FBI, the managing editor of the Journal of Law and Cyber Warfare, and an elected and appointed official at the local, county and state level. This includes service as a vice president of a quasi-governmental entity representing New Jersey's nearly 600 school boards. ABOUT THE HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organization culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentor and coach privacy professionals. Punit is the author of books “Be Ready for GDPR” which was rated as the best GDPR Book, “AI & Privacy – How To Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured amongst top GDPR and privacy podcasts. As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's value to have joy in life. He has developed the philosophy named ‘ABC for joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe. RESOURCES Podcast https://www.fit4privacy.com/podcast Blog https://www.fit4privacy.com/blog YouTube http://youtube.com/fit4privacy --- Send in a voice message: https://anchor.fm/fit4privacy/message
UK Data Protection Reform. Or, data the new strategy. Would it set a new standard in the data protection world? Or will it degrade GDPR Standard that the UK has through UK GDPR? Punit is joined by Kuan Hon for a conversation about all these questions relating to UK Data Protection Reform. Take a listen and get to understand the reform from someone who is involved in it. Disclaimer: Although Kuan is a member of the UK's International Data Transfer Expert Council, her views are personal to her alone and should not be taken to represent the views of the Council or any UK government department KEY CONVERSATION POINTS 00:00:00 Intro 00:01:46 Privacy Journey 00:03:14 About Data – The New Direction 00:04:50 Why do we need this 00:06:21 Understand what is changing in data protection 00:09:48 Is it Tougher than EU GDPR? 00:11:09 Categorizing Data will be allowed? 00:15:06 Impact on UK Adequacy 00:19:35 Do we still need DPO to implement this new law? 00:24:09 New builds of laws 00:26:25 Reformed, Change for Cookies 00:29:17 Timeline, Next step to bill for the new direction 00:31:58 Thank you ABOUT THE GUEST Dr. W Kuan Hon is Of Counsel in the Privacy and Cybersecurity Group of leading international law firm Dentons. An English solicitor and New York attorney with degrees in computing science as well as law, Kuan advises not only on data- and security-related laws but also on broader tech law issues, particularly regarding cloud and AI. She is a member of the UK government's International Data Transfer Expert Council, an Editor of the Encyclopedia of Data Protection and Privacy, and a guest lecturer for the Department of Computing at Imperial College London. Kuan previously volunteered for the UK Information Commissioner's Office, the UK National Cyber Security Centre, and the UN Privacy Preserving Techniques Legal Task Team. She is the author of "Data localization laws and policy - the EU data protection international transfers restriction through a cloud computing lens" (Edward Elgar, 2017) and has contributed to other books and written numerous articles. Although Kuan is a member of the UK's International Data Transfer Expert Council, her views are personal to her alone and should not be taken to represent the views of the Council or any UK government department Link to Bio: https://www.dentons.com/en/kuan-hon ABOUT THE HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organizational culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentoring and coaching privacy professionals. Punit is the author of books “Be Ready for GDPR” which was rated as the best GDPR Book, “AI & Privacy – How To Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured among the top GDPR and privacy podcasts. As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's values to have joy in life. He has developed the philosophy named ‘ABC for the joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe. RESOURCES Podcast https://www.fit4privacy.com/podcast Blog https://www.fit4privacy.com/blog YouTube http://youtube.com/fit4privacy --- Send in a voice message: https://anchor.fm/fit4privacy/message
It has been four years since GDPR came into effect. In this episode of the FIT4PRIVACY Podcast, Punit Bhatia and Jeff Jockisch have a chat about key moments in the world of privacy that occurred because of EU GDPR being into effect. KEY MOMENTS ON PRIVACY TRENDS Number of Privacy Laws Have Came Up California Consumer Protection Act Privacy has become a Board Topic Rise of a Ransomware Invalidation of Privacy Shield Privacy & Ethics Business benefits of privacy Location Data Chinese Data Protection Law Artificial Intelligence & Robotics FUTURE TREND OF PRIVACY Biometric Data Synthetic Identity ABOUT THE GUEST Jeff Jockisch is a data privacy researcher and the CEO of PrivacyPlan. He is certified as a CIPP/US. He focuses on building structure and adding value to datasets in the data privacy space. His focus most recently has been on Data Brokers and US privacy legislation and Biometrics. In the past, Jeff has worked in content systems and marketing, primarily in internet startups but also at large financial concerns. He is the founder and owner of PrivacyPlan. Provides data privacy consulting and offers privacy datasets for sale and as a public service. Data sets include perhaps the largest database of Data Brokers, tools for CIPP certification, and other reference sets. ABOUT THE HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organization culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentor and coach privacy professionals. Punit is the author of books “Be Ready for GDPR” which was rated as the best GDPR Book, “AI & Privacy – How To Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured amongst top GDPR and privacy podcasts. As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's value to have joy in life. He has developed the philosophy named ‘ABC for joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe. --- Send in a voice message: https://anchor.fm/fit4privacy/message
PODCAST: This Week in Amateur Radio Edition #1211 Release Date: May 14, 2022 Here is a summary of the news trending This Week in Amateur Radio. This week's edition is anchored by Terry Saunders, N1KIN, Dave Wilson, WA2HOY, Don Hulick, K2ATJ, Will Rogers, K5WLR, Fred Fitte, NF2F, Eric Zittel, KD2RJX, George Bowen, W2XBS, and Jessica Bowen, KC2VWX. Produced and edited by George Bowen, W2XBS. Approximate Running Time: 1:40:39 Podcast Download: https://bit.ly/TWIAR1211 Trending headlines in this week's bulletin service: 1. Shortwave Radio Outlets Around The World Are Resurrected To Support The War In The Ukraine 2. FCC Has Resolved Technical Issues and Resumes Processing Amateur Radio License Applications 3. Annual Armed Forces Day Cross-Band Exercise Set for May 14th 4. Get To 2022 Dayton Hamvention -- May 20th through the 22nd 5. Día del Radioaficionado Celebrated May 10th, 2022 in Puerto Rico 6. ARES Activated in Oklahoma for Tornado Clean-Up Communications 7. National Hurricane Center Annual Communications Test to be Held on May 28th 8. Students HAM it up on Roof of Engineering Building At University of Arizona 9. Japan Tour Boat Operator Used Amateur Radio Illegally On Boat That Sank 10. Brazil Puts New Regulations In Place Limiting Radio Frequency Interference From Solar Panel Installations 11. Youth On The Air Will Welcome Visitors To The Dayton HamVention 12. Amelia Earhart Transatlantic Flight 90th Anniversary To Be Celebrated On The Air 13. The Village Of Geeks Is Happening This Summer In The U.K. 14. German Radio Amateurs Plan To Use GSM/GPRS Technology On The Ammateur Bands 15. Brazil Tackles Radio Frequency Polluting Solar Panel Installations 16. Ofcom Short Range Devices and MilliMeter Wave Consultations 17. Radio Hams Provide Public Service Communications During Tour De Tulsa, Oklahoma Cycling Event 18. Radio Society of Great Britain Beyond Exams Club Scheme relaunches as Brickworks 19. Dhruv Rebba KC9ZJX, 18, hopes to develop a program that will enable youth to build and program microsatellites 20. Mobile application available to help navigate the Dayton HamVention 21. The ARRL forum at the Dayton HamVention will feature the FCC Enforcement Bureau's Lark Hadley, KA4A 22. Online tickets are now available for the Northeast HamXposition 23. New rules are going to be in effect for the 2022 Field Day Operation 24. Amateurs in the southern US are preparing for another projected active hurricane season Plus these Special Features This Week: * Technology News and Commentary with Leo Laporte, W6TWT, will talk about how difficult it is to unsubscribe or reach technical support at Alphabet, which is Google. He will also talk about the new Firefox 100 release which actually has a functioning privacy switch supported by new regulations about web tracking thanks to the EU GDPR. * Working Amateur Radio Satellites with Bruce Paige, KK5DO - AMSAT Satellite News * Tower Climbing and Antenna Safety w/Greg Stoddard KF9MP, covers everything you need to know to install and maintain your tower and antenna installation for your station. This Week Greg cover the best methods for mounting electronics on the tower. * Foundations of Amateur Radio with Onno Benschop VK6FLAB, will introduce you to Augustian Jean Fresnel, Zepplins, and a picket fence, and what they collectively have to do with VHF and UHF signal propagation. * Weekly Propagation Forecast from the ARRL * The latest from Parks On The Air and Summits On The Air (April Report) with Vance Martin, N3VEM * Bill Continelli, W2XOY - The History of Amateur Radio. Bill returns with another edition of The Ancient Amateur Archives, this week, Bill takes us back in time to when he first got bit by the R-F bug, which happened at a long lost radio retailer in western New York...Olsen Electronics. ----- Website: https://www.twiar.net Facebook: https://www.facebook.com/groups/twiari/ Twitter: https://www.twitter.com/twiar RSS News: https://twiar.net/?feed=rss2 iHeartRadio: https://bit.ly/iHeart-TWIAR Spotify: https://bit.ly/Spotify-TWIAR TuneIn: https://bit.ly/TuneIn-TWIAR Automated: https://twiar.net/TWIARHAM.mp3 (Static file, changed weekly) ----- Visit our website at www.twiar.net for program audio, and daily for the latest amateur radio and technology news. Air This Week in Amateur Radio on your repeater! Built in identification breaks every 10 minutes or less. This Week in Amateur Radio is heard on the air on nets and repeaters as a bulletin service all across North America, and all around the world on amateur radio repeater systems, weekends on WA0RCR on 1860 (160 Meters), and more. This Week in Amateur Radio is portable too! The bulletin/news service is available and built for air on local repeaters (check with your local clubs to see if their repeater is carrying the news service) and can be downloaded for air as a weekly podcast to your digital device from just about everywhere, including Acast, Deezer, iHeart, iTunes, Google Play, Spotify, TuneIn, Stitcher, iVoox, Blubrry, Castbox.fm, Castro, Feedburner, gPodder, Listen Notes, OverCast, Player.FM, Pandora, Podcast Gang, Podcast Republic, Podchaser, Podnova, and RSS feeds. This Week in Amateur Radio is also carried on a number of LPFM stations, so check the low power FM stations in your area. You can also stream the program to your favorite digital device by visiting our web site www.twiar.net. Or, just ask Siri, Alexa, or your Google Nest to play This Week in Amateur Radio! This Week in Amateur Radio is produced by Community Video Associates in upstate New York, and is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. If you would like to volunteer with us as a news anchor or special segment producer please get in touch with our Executive Producer, George, via email at w2xbs77@gmail.com. Also, please feel free to follow us by joining our popular group on Facebook, and follow our feed on Twitter! Thanks to FortifiedNet.net for the server space! Thanks to Archive.org for the audio space.
In this episode I talk about International Laws for Cyber Crime, Data Breaches, U.S. Data Privacy Laws, EU-GDPR, OECD Guidelines, Import & Export Controls, Transborder Data Flow and PCI-DSS. If you like this episode do share it with your buddies and also feel free to reach out to me with your suggestions, comments and queries. https://linkedin.com/in/tanayshandilya --- Send in a voice message: https://anchor.fm/tanayshandilya/message Support this podcast: https://anchor.fm/tanayshandilya/support
In this episode of the FIT4PRIVACY Podcast, Punit is joined by Heidi Waem for a conversation about recently passed Chinese Data Protection Bill and Data Transfer in Europe. Both have a chat about the similarities and differences between Chinese Data Protection Law and EU GDPR. Let's listen and have some fascinating information about these two topics. KEY CONVERSATION POINTS GDPR IN ONE WORD Similarities of Chinese Data Protection Law and EU GDPR Requirement of Chinese Data Protection Law Why Asian Privacy Laws Rely on Consent DPO Requirements in Chinese Law Data Transfer challenges ABOUT THE GUEST Heidi Waem is a specialist in data protection and privacy law and contract law. She has extensive experience in market practices, consumer laws, IP/IT and compliance. Heidi Waem's experience in these fields includes both litigation and non-contentious matters. Over the years she has been seconded to various multinational companies in different sectors which has given her valuable insights and experience in the needs of and problems faced by businesses, as well as experience as in-house counsel. For more, you can read https://www.dlapiper.com/en/belgium/people/w/waem-heidi/ ABOUT THE HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organization culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentor and coach privacy professionals. Punit is the author of books “Be Ready for GDPR” which was rated as the best GDPR Book, “AI & Privacy – How To Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured amongst top GDPR and privacy podcasts. As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's value to have joy in life. He has developed the philosophy named ‘ABC for joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe. RESOURCES Websites: www.fit4privacy.com, www.punitbhatia.com CONNECT Instagram https://www.instagram.com/punit.world/ Facebook https://www.facebook.com/PunitBhatiaSpeaker/ LinkedIn https://www.linkedin.com/in/punitbhatia/ Podcast http://hyperurl.co/fit4privacy YouTube http://youtube.com/fit4privacy Email hello@fit4privacy.com --- Send in a voice message: https://anchor.fm/fit4privacy/message
In this episode of the FIT4PRIVACY Podcast, we celebrate International Data Protection Day. We all know that Jan 28 is the Data Protection Day and on this occasion, Punit shares the Top 10 fines in the EU GDPR regime and what we can learn from these. KEY CONVERSATION POINTS 02:44 - 10. Notebooksbilliger.de — €10.4 million ($12.5 million) 05:27 - 9. Vodafone Italia — €12.3 million ($14.5 million) 08:41 - 8. Wind — €17 million ($20 million) 11:01 - 7. Marriott – €20.4 million ($23.8 million) 13:33 - 6. British Airways – €22 million ($26 million) 17:40 - 5. TIM – €27.8 million ($31.5 million) 20:14 - 4. H&M — €35 million ($41 million) 22:06 - 3. Google – €50 million ($56.6 million) 23:56 - 2. WhatsApp — €225 million ($255 million) 26:10 - 1. Amazon — €746 million ($877 million) ABOUT THE HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organization culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentor and coach privacy professionals. Punit is the author of books “Be Ready for GDPR” which was rated as the best GDPR Book, “AI & Privacy – How To Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured amongst top GDPR and privacy podcasts. As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's value to have joy in life. He has developed the philosophy named ‘ABC for joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe. RESOURCES Websites: www.fit4privacy.com, www.punitbhatia.com CONNECT Instagram https://www.instagram.com/punit.world/ Facebook https://www.facebook.com/PunitBhatiaSpeaker/ LinkedIn https://www.linkedin.com/in/punitbhatia/ Podcast http://hyperurl.co/fit4privacy YouTube http://youtube.com/fit4privacy Email hello@fit4privacy.com --- Send in a voice message: https://anchor.fm/fit4privacy/message
Do you need support with your content marketing? Come into my content mentorship in order to create content that generates you clients: http://www.contentmentorship.com/
The Millennicast: Where Curious Minds Meet Inspiring Professionals
For this episode I will be speaking to Ian Ballon about Data Protection regulation in the modern age. Ian is a practicing U.S. attorney, IP and internet litigator, and Co-Chair of U.S. law firm Greenberg Traurig's Global Intellectual Property & Technology Practice Group. Ian is also author of the five-volume treatise, E-commerce and Internet law: Treatise With Forms. In addition, he serves as the Executive Director of Stanford University Law School's Center for the Digital Economy. We will be discussing the increased attention afforded to data protection since the rise of “Big Tech” firms such as Amazon, Facebook, Google, Apple, to name but a few. The U.S.'s approach to antitrust law (commonly known as competition law in the EU) will also serve as an interesting and relevant aspect to this debate by discussing the extent to which privacy ought to serve as a “non-price” element in antitrust analysis. The U.S. has also recently been privy to the adoption of EU GDPR-style privacy legislation through a patchwork of laws, with the California Consumer Protection Act (CCPA) serving as the most robust and authoritative one to date. How likely the chance is, and how effective it is, for the U.S. to adopt federal privacy legislation in order to steer away from its current “patchwork” of data privacy regulation will shed light on what a potential future trajectory of data protection regulation will look like.For more engaging and inspiring talks like these or if you'd simply like to reach out, visit “themillennicast.buzzsprout.com”. If you enjoyed this episode spread the word and don't forget to rate, comment and subscribe!Ian Ballon's website: https://www.ianballon.com/about-the-author.htmlThe Treatise: https://www.ianballon.com/about-the-treatise.html
MIHÁLOVITS GAZDA: Beszéljünk végre egy komplex élelmiszergazdaságról! Az élelmiszerre elköltött pénzből az értéklánc tagjaihoz nagyon eltérő összegek jutnak el. Úgy véli, hogy egy egészségesebb magyar élelmiszergazdaság érdekében a megoldás a stabilabb ár- és jövedelmi szint kialakítása lenne ideális az értéklánc minden tagjánál. Hollósi Dávid, a Takarékbank és a Magyar Bankholding csoport Agrár és Élelmiszeripari üzletág vezetője EQUILOR TŐZSDENYITÁS - Bosnyák Zsolt, senior elemző HEURÉKA: Privacy - a magánszféra jövője. November 1-től érvénybe lépett Kínában a Personal Information Protection Law vagyis a PIPL, ami nagyon hasonló az EU GDPR-jához. Bizony, meglepő, de nem váratlan fordulat. Egyre inkább úgy tűnik, hogy Kína ebben is megelőzheti pl. az USA-t, pedig ezt aztán tényleg nem gondoltuk volna még 5 éve. A kínai privacy gondolkodás mögé pillantunk, hogy kicsit jobban értsük, mi is zajlik ebben a meghatározó országban, talán egy kicsit a klasszikus nyugati kliséből kitekintve. Ezzel párhuzamosan az ISO sztenderdek között hamarosan megjelenik egy új, a 31700-es család, amely "Privacy by design for consumer goods and services” problémát kezeli vagyis erre tolja a cégeket, hogy a magánszféra védelmét tényleg alap szinten építsék be a szolgáltatásaikba. Közben a GPT-3 már nem várólistás, tehát szinte “bárki” ráugorhat, ha használni akarja. Ezek a lépések, változások alapvetően befolyásolják a magánszféra közeli jövőjét, és egy érdekes távoli jövőt vetítenek előre. Keleti Arthur, az Informatikai Biztonság Napja (ITBN) alapítója, kibertitok jövőkutató
Coming up in this week's episode: Brittany Ferries data breach, Google UK Supreme Court ruling, Whatsapp given right to appeal, Homeworking increases GDPR breaches, Cronofy opens Netherlands office to comply with EU GDPR, RobinHood data breach, Premier Property Lawyers data breach halts conveyancing, All party group calls for better protection for workers affected by AI, Tech Etch data breach, Durham TTS data breach, CCPA extra-territorial scope, Court rules against Kroger Co after a data breach, City of Titusville, Florida data breach Edmonton man arrested following a data breach, Costco credit card data breach
Siliconpolitik: Mile Sur Mera Tumhaara— Pranay KotasthaneHigh Technology cooperation is fast becoming a differentiating point of the Quad arrangement. It appears that the Quad Working Group, which was formed after the first Summit meeting in March 2021, has locked in space, biotechnology, 5G communications, cybersecurity, and semiconductors as five immediate focus areas. Music to my ears. As Technopolitik readers are aware, I have been making a case for a Quad collaboration on semiconductors over the last five months. So it was gratifying to find out that, amongst other things, the Quad launched a Semiconductor Supply Chain Initiative to "map capacity, identify vulnerabilities, and bolster supply-chain security for semiconductors and their vital components."I have a long article in News18 analysing the significance of this announcement. Here are a few excerpts.Q: What's the big deal about this announcement?A: Two ways to look at it.One, the Quad agrees that semiconductors are ‘metacritical’ — in the sense that success in other critical and emerging technologies depends on a secure, resilient, and fast-advancing semiconductor supply chain.Two:The summit fact sheet adds that the Quad partners should collectively support a diverse and competitive market for producing semiconductors. The last sentence is significant—it signals a shift in mindset from national indigenisation to strategic cooperation.Subsidies, incentives, and tax breaks were the only instruments countries pursued — separately — until now. Semiconductors entering the Quad agenda is a recognition of the fact that no one nation-state can eliminate all bottlenecks in the complex semiconductor supply chain. To illustrate this point, see the Taiwan Economy Minister’s statement earlier in the week:“Taiwan alone could not sort out the problem because the supply chain is so complex. The bottleneck in fact is in Southeast Asia, especially Malaysia, because for a while the factories were all shut down.”When the country that accounts for nearly 70 per cent of contract chip manufacturing says that it alone cannot de-bottleneck the supply chain, other countries should take note. As I keep saying: strategic cooperation is a necessity, not a choice. Q: What next. Is this initiative enough?A:“Mapping the supply chain vulnerability should only be a first step of the collaboration. The grouping can directly bolster supply chain security in the following ways.One, Quad can form a consortium aimed at building a diversified semiconductor manufacturing base. The consortium could create a roadmap for new manufacturing facilities across Quad countries. The focus should be to collectively have access to manufacturing at the leading-edge nodes (5 nanometres and below) and critical trailing-edge nodes (45 nanometres and above). The latter will continue to remain workhorses for automotive, communications (5G), and AI.Two, Quad can sponsor new standard developments such as composite semiconductors and create one centre for excellence (CoE) in each Quad country in an area of its immediate interest. For example, Australia could host the CoE for new materials in electronics, Japan could host the CoE for silicon manufacturing equipment, and the US and India could host CoEs on specific fabless design architectures.Three, Quad can facilitate strategic alliances between companies in each other’s countries. For example, faster visa processing and lower employment barriers for semiconductor professionals in Quad member countries could facilitate higher technology exchange and joint development levels. Removing technology transfer restrictions could make overseas licensing easier. Easing capital flows in this sector could again foster more joint development projects.”Q: What's in it for India?A:“India should use the Quad collaboration to get a Japanese or American company to manufacture semiconductors in India, even if it’s at a trailing-edge node such as 65 nm. Collaborating with partners would minimise the risk of failures while ensuring India’s core defence and strategic interests are secured.Moreover, the AUKUS defence alliance has shown that the US is willing to share sensitive technologies with key partners, something it wasn’t amenable to in the past. This new technology alliance mindset should become the norm in Quad as well. India should push for the US to lower investment barriers and reduce export controls.Apart from IC manufacturing, India should double down on its core strength. In a Takshashila Institution report titled India’s Semiconductor Ecosystem: A SWOT Analysis, we observed that India has an outright advantage in semiconductor design. The next step should be to encourage indigenous intellectual property creation. PM Modi’s meeting with the Qualcomm CEO is vital in this regard. With more multinational companies moving their cutting-edge semiconductor design to Indian offices, the Indian ecosystem will develop organically.”Well begun is half-done. In the next edition, I’ll have some recommendations for what the Quad can consider to deepen this cooperation on semiconductors.Cyberpolitik #1: Rus(sia)hing to decisions— Prateek WaghreIn the last few weeks, there have been two sets of significant developments involving Russia and the Internet:After several weeks of sustained pressure from Russian authorities, in mid-September, Google and Apple removed a 'smart voting' app from Alexei Navalny's team just before the elections (Techmeme aggregation of related links)As part of its efforts to deal with COVID-19-related misinformation, YouTube took action against two German-language channels operated by Russia Today. Russia threatened to retaliate by blocking YouTube and German media outlets.These issues represent a microcosm of the myriad issues at the intersection of technology and geopolitics.In this section, let's look at three of them:Content Moderation through the stackNot only did Apple and Google remove the app from the Russian versions of their respective app stores, but they also took actions that had downstream effects. Apple, reportedly, asked Telegram to remove some channels that Navalny's team were using to share information or risk being removed from the App Store. Telegram complied.These actions are neither new nor exceptional - but what is notable is that they have been praised (de-platforming Alex Jones' Infowars, Parler) or criticised (VPN apps in China, HKMAP.live during the 2019 HK protests) in the past, depending on the context. WSJ’s Facebook Files series also references Apple’s role in Facebook’s response to concerns about human trafficking. This is, of course, not specific to Apple, as a range of companies and services at different levels of the internet stack like AWS, Cloudflare, GoDaddy, etc., have had to make such decisions.A particularly notable recent example was the case of OnlyFans, where the company announced (and later rolled back) policies that would have banned creators who posted adult content. The move was a result, not of any regulatory pressure or social backlash, but the apparent squeamishness of some firms in the financial services industry in the UK, which would have had an impact on creators around the world.I've also written about the subject of content moderation through the stack over on MisDisMal-Information (27 - Content Moderation Stack, 36 - Must-Carry Water and Internet Scores and 48 - moderation: stacked and loaded)Complying with 'local regulation'In the lead-up to Apple and Google removing the 'smart 'voting' app, they were threatened with fines, made to appear before committees where reports suggest that authorities named specific employees that would be liable for prosecution. A proposed Russian law requires that internet companies with over 500 thousand users in Russia set up a local presence. Similar regulation around the world has earned them the moniker of 'hostage-taking laws' as they open employees up to the risk of retaliation/harassment by state authorities.The local regulation that led to Apple warning Telegram is believed to be about 'election silence' - which prohibits campaigning during elections. Such laws are not unique to Russia.Multinational companies operating across jurisdictions have had to 'comply with local regulation.' It was rarely an option until the information age, making it possible to scale across countries without establishing a physical presence. Even in the internet economy, companies that operate physical infrastructure deep into the tech stack often have limited choice. I have some personal experience with this, being part of a team that managed Content Delivery Network operations for China and Russia between 2015 and 2018.Rapid and Global Scale Decision-makingWhen YouTube decided to enforce its COVID-related misinformation policies, did it anticipate that channels operated by Russia Today would be swept up by the enforcement action and did it expect threats/retaliation by Russian authorities? In 2021, there is no excuse not to, considering we have witnessed so many instances where technology companies found themselves in situations with geopolitical implications. Yet, we must stop and ask two questions. First, do they have the capacity to make these decisions on a global scale on a near-realtime basis? Second, do we want them to make such choices? Arguably, the order should be reversed, but we have to ask the capacity question in parallel since we're already in a situation where they make such decisions.As US and allied forces were withdrawing from Afghanistan, sections of the press were heavily critical of social media platforms for continuing to platform Taliban-associated voices. Though, we also do need to take into account that nation-states with significant resources and capacity dedicated to international relations and geopolitics have, even now, yet to make a decision (this, of course, is likely strategic in many cases). But it does leave several open questions for private companies that often rely on nation-states for directionality. In this context, it is worth listening to this Lawfare podcast episode which draws parallels with the financial services industry and the mechanisms they can rely on to make decisions regarding dealing with banned groups.Takshashila is doing a Global Outlook Survey covering domains like India’s bilateral and multilateral engagements, national security concerns, economic diplomacy and attitudes towards the use of force. If this sounds interesting, do click-through to participate.CyberPolitik #2: Thinking (Data) of the Leaks — Sapni G KVoluminous reports surrounding data leaks have surfaced in the past two weeks. Facebook prioritising profits over the safety of its platforms has kept users and the US Congress on their toes. Another series of leaked reports dubbed the Pandora Papers allege tax evasion by famous and powerful figures across the globe. The underlying thread running through these investigations is the nature of these exposes – data leaks. These are whistleblower and media-led efforts that broke into the secret vaults of data held dear by few powerful people. The journalistic value of these investigations cannot be undermined. However, the question of data governance mechanisms crops up again.Data regulation is not settled for good, regardless of the EU GDPR. Although it provides certain consent-focused templates for transparency in the use of data across sectors, there is no apposite global standard for data governance yet. In the absence of any clearly laid down and achievable normative standard, regulation of technology itself will emerge as a challenge in multiple forms. This manifests as multiple problems in platform regulation – where data maximisation leads to the prioritisation of engagement on the platform and consequentially pushing users into rabbit holes of harmful content, faulty algorithmic recommendations, and ultimately platforms that wield more power than many States.These challenges are now increasingly being acknowledged by States. China’s efforts at regulating its tech titans reflect its intent to ensure that corporations keep towing its line. The recently concluded EU-USA Trade and Technology Council meeting also reiterated the necessity to lay down standards for data governance. This is critical as we develop technology that captures larger troves of data, such as Artificial Intelligence. The joint statement issued by the Council emphasises the need for cooperation in standard-setting, focusing on human rights and democratic values.Reports that India’s Personal Data Protection Bill will expand its mandate to become an exhaustive data protection legislation are worth consideration here. India’s data governance framework is limited to a few sectoral regulations by the RBI and the SPDI Rules under the IT Act, 2000. While an overhaul of the current regulatory regime is necessary, thinking through nuances with speed and precision is important. India’s pace in this regard may not give us an opportunity for global standard-setting. A well-defined data governance regime is critical as we start large-scale implementation of technology-based solutions that deal with sensitive information such as health data.Antariksh Matters: The Quad looks to the heavens, with an eye on China— Aditya RamanathanThe Quad has taken baby steps towards space cooperation. A fact sheet jointly released by India and the US announced that the Quad had set up a working group on space. The bilateral joint statement also outlined three areas of cooperation: sharing satellite capabilities on “climate-change risks and the sustainable use of oceans and marine resources,” building capacity for space-related activity among other Indo-Pacific states, and consulting on norms and guidelines. Sharing data and analysis on climate change makes sense because it is a major threat to states in the Indo-Pacific and is a way of providing public goods to smaller states in the region. The second area of cooperation - capacity building - can also turn the Quad into a major provider of public goods to smaller states in the region, helping them operate their own military, commercial, and scientific satellites, thereby reducing their dependence on China’s space programme. If the Quad actually achieves these goals, its member states might also be able to operate more ground stations from the territory of these states, improving their own space situational awareness (SSA). The third area of cooperation mentioned - consulting on norms and guidelines - may sound the most innocuous or non-descript, but it is, in fact, rooted in the strategic considerations that prompted the creation of the Quad in the first place. China’s 2007 kinetic ASAT missile test certainly prompted India’s own test in 2019. The creation of the PLA Strategic Support Force and mounting evidence of China’s counterspace programme have finally prompted Quad states to coordinate their efforts. Norms and guidelines are inherent to the challenge of managing strategic competition in space because they can help shape its pace and direction. This is the primary reason that the US is opposed to Sino-Russian proposals for a treaty governing the weaponisation of space. India’s own approach to these proposals has been cautious, but the realities of China’s non-kinetic counterspace capabilities will continue to nudge it into joining the other Quad states in proposing new norms of behaviour in outer space. While the joint statement made a brief mention of space situational awareness (SSA), this is likely to become an important part of Quad cooperation. Here, the geographic dispersion of the four Quad states is actually an asset, as it allows Quad states to leverage ground stations across continents and in both hemispheres. Finally, we should note something crucial that the joint statement did not cover: the private sector. While stories of interplanetary probes or human spaceflight may dominate the headlines, what matters most are satellites that look back at the Earth, and Earth-based sensors that track satellites in the planet’s celestial littoral. This is the beating heart of commercial space enterprise, and it presents a major opportunity for the Quad to create and expand “bubbles of trust” that allow for the sharing of key space technologies. The Quad working group on space can also function as a mechanism to identify policies that will encourage greater commercial interaction between private space companies in the member states. India could benefit immensely from this, whether by offering satellite construction or launch services, or offering downstream services for image processing and analysis. Our Reading Menu[Paper] CSET’s From Cold War Sanctions to Weaponized Interdependence is essential reading for anyone trying to understand the history of technopolitik[Article] Navigating the tech stack - Joan Donovan[Policy Review] Expanding the debate content moderation - Tarletop Gilespie et al[Article] How hate speech reveals the invisible politics of internet infrastructure - Suzanne van Geuns and Corinne Cath-Speth.[Paper] The Flaws of Policies Requiring Human Oversight of Government Algorithms by Ben Green[Article] The Largest Autocracy on Earth by Adrienne LaFrance This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit hightechir.substack.com
Punit is joined by Robert Baugh for a conversation about how to understand EU GDPR appropriately. And, why understanding a privacy law can be complex. Robert Baugh is an Engineer turned lawyer, management executive. He specializes in IP, Practice law, and Privacy. Robert founded Keepabl to help customers drive trust and drive business with intuitive, enjoyable Compliance SaaS. (Yes, enjoyable - usability drives usage which drives your ability to get the job done). This is an extract from the full episode of The FIT4PRIVACY Podcast. If you like this, you would enjoy the full episode. If this is your first time, the FIT4PRIVACY Podcast is a privacy podcast for those who care about privacy. In this podcast, you listen to and learn from industry influencers who share their ideas. The episodes are released as audio every Wednesday and video every Thursday. If you subscribe to our podcast, you will be notified about the new episodes. And, if you have not done it, write a review and share this with someone who will benefit from this. --- Send in a voice message: https://anchor.fm/fit4privacy/message
Punit is joined by Abhinav Kumar for a conversation about the impact of privacy legislation like GDPR on marketing and communication. Both discuss how to create a culture of privacy and how privacy requirements can be implemented in practice. Abhinav Kumar is the Chief Marketing and Communication Officer for TATA Consultancy Services. He is proud custodian of this decade's fastest-growing brand in the Digital & IT Services Industry. The brand value of the company has risen from US$ 2.3 billion in 2010 to US$ 14.9 billion in 2021. This is a snippet from the full episode of The FIT4PRIVACY Podcast. If you like this, you would enjoy the full episode. If this is your first time, the FIT4PRIVACY Podcast is a privacy podcast for those who care about privacy. In this podcast, you listen to and learn from industry influencers who share their ideas. The new episodes are released as audio every Wednesday and video every Thursday. If you subscribe to our podcast, you will be notified about the new episodes. And, if you have not done it, write a review and share this with someone who will benefit from this. --- Send in a voice message: https://anchor.fm/fit4privacy/message
In this episode, Victoria talks about the lawful basis for processing data, as provided by the EU GDPR. The 6 lawful basis are: consent fulfilling contractual obligations fulfilling legal obligations vital interest public interest legitimate interest The Nigerian NDPR provides for all the above basis except legitimate interest. However, the Guidelines for the Management of Personal Data by Public Institutions in Nigeria refers to legitimate interest of the data subject. The GDPR speaks only of legitimate interest of the data controller. Victoria sheds light on all these and more. She also provides the answer to the question asked in the first episode about the first country to enact a data protection law. You can connect with Victoria on LinkedIn and on Twitter
In this maiden episode, you get to see our host, Victoria Oloni, in all her colour, or a good part of it. She tells us how she got into (or stumbled) data protection, winning the first edition of the Adavize Alao Data Protection Essay. We also get a sneak peek at some guests and future topics for discussion. She also provides a working definition of personal data, data processing, the EU GDPR, and Nigeria's NDPR. If you stick to the end, there's a question. The first three correct answers will get free airtime. To give us your answer, follow us on any social media (DigiLaw) and tell us your answer. On Twitter/Instagram - @digilawng LinkedIn - DigiLaw
In this special episode of the FIT4Privacy Podcast, we celebrate the EU GDPR at its 3rd anniversary by asking different privacy influencers to put GDPR in one word. You will be fascinated to learn how one legislation can be described in so many different words. ABOUT THE GUESTS Punit Bhatia, CEO FIT4PRIVACY Nicolas Castellon - Senior Manager at Capgemini Cyber Security Unit (NL) Nicola Fabiano, President of San Marino Data Protection Authority Eline Chivot - Senior Policy Analyst, Center for Data Innovation Saurabh Gupta - CEO, PlumCloud Labs Jodi Daniels - Founder, CEO & Privacy Consultant, Redclover Advisors Joanna van der Merwe - Privacy and Protection Lead, Centre for Innovation, Leiden University Richard Merrygold - DPO & Co-Founder of iSTORM® Rob Masson - CEO, The DPO Centre Allen Woods - How The Hell Did That Happen? Danielle Jacobs - CEO of Beltug Corinne Herzog - General Counsel Georges Ataya - Professor and Academic Director Barry Moult - Privacy Consultant | ICO Award Winner Gal Ringel - CEO, Mine #1 in Forbes 30 under 30 Raghavan Chellappan - Co-founder & CTO, BYTESAFE Marcio Cots - Principal Data Consultant Ramkumar Ramachandran - Principal Consultant Tash Whitaker - Director - Whitaker Solutions Ltd Christoph Balduck - Managing Partner, Data Trust Associates Dawid Jacobs - CEO at Diverse Authentication Library Global Thomas Besore - Attorney - Privacy Advocate Jennifer Salat - Data Protection Officer Chris Casale - Senior Operations, Technology And Business Strategy Director Ryan Smith - International Marketing Speaker ABOUT THE FIT4PRIVACY Podcast The FIT4PRIVACY podcast is for those who care about privacy. In this podcast you get an opportunity to listen to views from different industry influencers. Currently in its season 2, this podcast brings to you practical experiences from industry leaders, their views on privacy, challenges they face and their ideas on how they solve those challenges. This podcast is created and hosted by Punit Bhatia who is one of the leading privacy experts and helps CXOx, CPOs and DPO in creating a culture of privacy. RESOURCES Websites: www.fit4privacy.com, CONNECT Podcast http://hyperurl.co/fit4privacy YouTube http://youtube.com/fit4privacy Email hello@fit4privacy.com --- Send in a voice message: https://anchor.fm/fit4privacy/message
Trouvaille LLC – Trouvaille HQ6790 E. Calle La Paz, Tucson, Arizona, United States(520) 300-1056Website: https://www.trouvailletravel.orgEmail: travel@trouvailletravel.orgPhone: 520-300-1056Toll-free: 1-800-983-3652Voted Best in Group Travel 2018 https://www.trouvailletravel.org/Trouvaille ~ We are a lucky travel find, for you!Week 1 Crowdfunding Update: We Have Liftoff!Paul S. Hardersen, Ph.D., Chief Executive Officer, Founding Partner.Paul S. Hardersen, CEO, Ph.D.Trouvaille is not your typical small group travel company. We are also not a travel agency. We are much more! Trouvaille is nurturing an authentic, vibrant travel community through meaningful, memorable, and expertly planned experiences. Our goal is to become your partner in travel and we want to help you achieve all of your travel aspirations now and in the years to come!Another part of Trouvaille's mission is to connect the people of the world to foster understanding across nations and cultures while witnessing the beauty of our planet. We are a leader in sustainable, experiential, and life-affirming small group tours.We are proud to announce our 2018 award for Readers' Choice for the Arizona Daily Star for the small group travel category.Trouvaille's mission is to bring people together to better understand, experience, and appreciate the amazing diversity of the peoples, cultures, histories, and natural environments of our planet. Small Groups. Expert Guides. Personalized Service. Unique Experiences.Trouvaille guides you to the best of each extraordinary destination. Our accomplished hosts plan and lead the way for an exciting and safe travel experience. We take care of the details while you relish the adventure. Discover new places, meet new people, unearth the history, delight in local cuisine, and make unforgettable new connections.Each Trouvaille guide is a travel connoisseur who expertly plans our small group guided tours in exotic, stunning, and historically important locations around the globe. Immerse yourself in each destination with uniquely curated daily activities.Learn about the local ways of life, see breathtaking natural wonders, and make each place your own.Trouvaille means lucky find because, with travel, you never know what wonders will find you. Choose your next immersive travel experience from our options around the globe. Kathy Winger AttorneyLaw Offices of Kathy Delaney Winger4455 E 5th Street, Suite 101, Tucson AZ 85711kathy@kdwinger.com520-391-4475www.kdwinger.comSOCIAL MEDIA: LinkedIn | Twitter |Kathy Winger is a business, corporate, real estate and cybersecurity attorney who represents companies and individuals in commercial and corporate transactions. She has more than twenty years of experience as an attorney in the private sector and, prior to that, served as in-house counsel to a national bank and financial services company. She is currently a solo practitioner in Tucson, Arizona. Kathy frequently speaks nationally and locally about cybersecurity issues from the perspective of a business lawyer and her audiences include business owners, CEO's, CFO's, financial executives, lawyers, insurance brokers, health insurance professionals and technology professionals. She has written articles on cybersecurity that have appeared in national publications and has been interviewed about cybersecurity issues for newspaper articles and radio shows.Kathy is the Executive Vice President of the Board of Directors for Boy Scouts of America Catalina Council and serves on the Advisory Board for the National Bank of Arizona Women's Financial Group. She is also on the Board of Directors of the Southern Arizona Children's Advocacy Center and is a member of the Better Business Bureau of Southern Arizona.Additional Information:SEO Keywords: Arizona Cybersecurity; Cybersecurity; Data Breaches; Arizona Data Breach Statute; Arizona Law; Best Practices; Business; Business Financing; Business Growth; Business Lawyer; Business Law; Corporate Law; Contracts; CISO; Credit Card Fraud; Credit Cards; EU GDPR; Fraud; NY DFS Regulation; Third Party Vendors; Unauthorized Use of Credit Card; LLC; Operating Agreement; Buy-Sell Agreement; Partnership; Incorporation; Real Estate Contracts.Richard Phipps, Branch Manager and Sales Leader – Tucson and Southern AZOnin Staffing1076 N Swan RoadTucson, Arizona 85711rphipps@oninstaffing.comPhone: 520.433.4765Society of Human Relation Member (SHRM-GT), Diversity & Inclusion committee memberTucson Metro Chamber active member, Ambassador committee memberSOCIAL MEDIA: LinkedInTalent Acquisition / Staffing professional with over 13 years on hands-on and leadership experience in the Tucson area. My focus is on delivering full-cycle staffing solutions, whether that is short-term, contract or long term, permanent. I love to serve our clients and support them by placing quality people in the right position at the right time. Business infoOnin Staffing - a privately held debt-free company with over 100 branches throughout the US, joins the Tucson community with a fresh approach to staffing. We treat people in a kind professional manner. Hires are not just a number to close a post. We hire teammates…not temps.Clients are business partners and we spend time learning your business staffing needs, so you can focus on operational fitness. We provide communication that is honest, open and dependable.Do you have a staffing need in Tucson or Southern Arizona? Whether the need is 1 or 100, reach out and experience the Onin full-service difference.
Join members of our tech and data team, Andy Splittgerber and Christian Leuthner, as they discuss the first fines levied under the EU's data protection law three years after the EU General Data Protection Regulation went live. They take a look at recent developments and describe situations where it may be worth challenging the data privacy enforcers. Andy and Christian give valuable tips on what to do if the data protection authorities knock on your door. For more information, visit Reed Smith's Data Protection, Privacy & Cybersecurity page.
In this episode of Serious Privacy, K Royal is joined by guest co-host Ralph O’Brien, who brings that United Kingdom perspective to data protection. As a well-known and respected privacy professional, Ralph took the opportunity to discuss some of the current hot topics in privacy with K, such as the impact of #Brexit on managing privacy programs in Europe. Join us as we discuss the UK General Data Protection Regulation and how it was adopted and adapted from the EU GDPR and what might change in the approach companies take to appointing a local representative or designating a data protection officer. In addition, they touch on Schrems II, genetic testing, facial recognition, and risk-based privacy controls. It’s a lively discussion where the conversation goes where it may, and Ralph and K learn how much they have in common. And of course, there were references to both Harry Potter and the Avengers in terms of exploring what a new data transfer mechanism between the US and the EU would be called.As always, if you have comments or feedback, please contact us at seriousprivacy@trustarc.com.
If you like this, you will enjoy the full episode of The FIT4PRIVACY episode wherein Punit Bhatia has a conversation with Corinne Herzog to discuss a lawyers' perspective on privacy, its challenges and solutions. Key points discussed: ✅ the evolution of privacy laws over last 30 plus years ✅ the shift and change GDPR brought about ✅ the challenges of implementing EU GDPR in companies Corinne is a seasoned law attorney who has over 30 years of experience and has served as European Head of Legal in Stanley Black and Decker. Listen to this conversation and share your comments on what you think. You can subscribe to FIT4PRIVACY podcast so that you are notified about new episodes. --- Send in a voice message: https://anchor.fm/fit4privacy/message
In this episode of The FIT4PRIVACY episode, Punit Bhatia has a conversation with Corinne Herzog to discuss a lawyers' perspective on privacy, its challenges and solutions. Key points discussed: ✅ the evolution of privacy laws over last 30 plus years ✅ the shift and change GDPR brought about ✅ the challenges of implementing EU GDPR in companies Corinne is a seasoned law attorney who has over 30 years of experience and has served as European Head of Legal in Stanley Black and Decker. Listen to this conversation and share your comments on what you think. You can subscribe to FIT4PRIVACY podcast so that you are notified about new episodes. --- Send in a voice message: https://anchor.fm/fit4privacy/message
Debbie Reynolds “The Data Diva,” talks to Dawid Jacobs, CEO of Diverse Authentication Library DAL-Global Inc, a Global Identity Protection and Authentication. We discuss evidence-based identity authentication, the differences between identity management and access management, what is a digital twin and self-sovereign identity, the problem of financial fraud with fake identities, identity concerns with voting, Identity theft, the bias in facial recognition biometrics identity systems, deep fakes, privacy requirements in the EU (GDPR) and South Africa (POPI) related to authentication of individuals, credit bureaus data collection and data sale, the need to have individuals own their identities, and his wish for data privacy regulation globally.
Debbie Reynolds “The Data Diva,” talks to Dawid Jacobs, CEO of Diverse Authentication Library DAL-Global Inc, a Global Identity Protection and Authentication. We discuss evidence-based identity authentication, the differences between identity management and access management, what is a digital twin and self-sovereign identity, the problem of financial fraud with fake identities, identity concerns with voting, Identity theft, the bias in facial recognition biometrics identity systems, deep fakes, privacy requirements in the EU (GDPR) and South Africa (POPI) related to authentication of individuals, credit bureaus data collection and data sale, the need to have individuals own their identities, and his wish for data privacy regulation globally.
In today’s episode, we are delving into the issues we discussed in our previous episode #24 on the NHS Track and Trace app and considering in more detail the legal, privacy and practicality barriers to many track and trace apps in Europe. We discuss the take up of Track and Trace apps in the EU and find it is mostly 30% of the population and lower. Data privacy when using apps has been protected due to EU GDPR, however, other basic freedoms have been taken from us and our way of life severely impacted over the course of 2020. Track and trace apps have not had the hoped-for beneficial impact in the EU. Had we taken a different approach to using more data and made the apps mandatory, could the outcomes have been different? What does this mean in practise for track and trace apps as future solutions to help governments manage pandemics? Compare and contrast to other Asian countries. If 70 - 80% app usage is realistically needed to be effective, then why did we not make track and trace apps mandatory? What are we to learn from countries in Asia? How do we find a rapid and effective way to discuss and agree the extended use of our data to improve outcomes, rapidly, either during pandemics or outside of them? As Privacy, Legal and Tech professionals we must continue this conversation and find a framework for agreeing the greater use of data in a mandatory way to support better pandemic and health outcomes. The economic costs of lockdowns are extremely high and have a direct effect on a nation's ability to provide future healthcare. Our short term fix to today's problem could cause many more problems for the future. GDPR Now! Is brought to you by Data Protection 4 Business & This Is DPO. www.dpo4business.co.uk www.thisisdpo.co.uk. Guests Roger Marlow Roger has worked in software for over 30 years with experience in building software for the finance, retail, automative and government sectors. He has been involved in the creation of several companies including a healthcare technology company that works for the NHS. Guests Mark Sherwood-Edwards Mark helps CEOs negotiate smarter, more profitable, contracts. During his time spent working in law firms and also as in-house counsel he specialised in contracts as well as sales-contracting transformation, in organisations across the fintech, adtech, tech and outsourcing sectors. Founder Clearview Legal https://clearviewlegal.co.uk/ Special Guests: Mark Sherwood-Edwards and Roger Marlow.
Brexit planning should now firmly be on everyone's agendas as the end of the transition period looms closer. This podcast discusses the implications of Brexit on data privacy and considers the key, practical steps that organisations need to put in place as part of their Brexit preparations. As well as considering the importance of adequacy of transfers of personal data from the EEA to the UK in light of the most recent developments, we also consider how the EU GDPR will continue to apply to certain personal data after the end of the transition period; the implications flowing from a change in regulator and the potential for multiple enforcement actions; the need, in some cases, to appoint a representative in the UK and/or the EU; and the impact on processing grounds and processor terms.
The European Data Protection Board has issued GDPR controller-processor guidelines (for consultation) which define the roles and responsibilities for the different actors. Laura Linkomies talks with Elisabeth Jilderyd, International Legal Advisor and Coordinator, International and EU Department at Sweden's Data Protection Authority about the controller-processor relationship, joint controllers, drawing up agreements between the parties, and their responsibilities in case of a data breach.
The iPhone event and what it means to podcasters, update on podcast apps that support video podcasts, Amazon Music troubleshooting, another easy win for podcast growth, speaking of growth, the difference between a spike and growth, recommending podcast artwork, a podcast privacy soap box, and geographic and user agent stats Audience feedback drives the show. We'd love for you to email us and keep the conversation going! Email thefeed@libsyn.com or call 412–573–1934. We'd love to hear from you! ATTEND GHOULS NIGHT OUT! SIGN UP FOR OUR NEWSLETTER HERE! Quick Episode Summary :13 Intro 4:08 PROMO 1: Legally Insane Films 4:46 Rob and Elsie Conversation Apple had their iPhone event! What matters to podcasters Podcast Addict does support actual video from video podcasts and othe updates from podcast apps Where are podcasts available in Amazon Music available? Troubles with trailers in Amazon Music We forgot “developing a podcast app!” as another easy win for podcast growth Elsie uses Forecast for chapter markers Nope, it's not a spike 31:07 PROMO 2: Lady Mouth You don't need to upload episode artwork, but we recommend it Norman Rodecaster weighs in on NR Podcast.com will not be changing hands anytime soon Why did you leave us? For a dream job! Spotify allows music in podcasts? Soap Box: Privacy 49:56 PROMO 3: About IBD Stats! Geographic and User Agent Where have we been? Where are we going? Featured Podcast Promos + Audio PROMO 1: Legally Insane Films PROMO 2: Lady Mouth PROMO 3: About IBD Thank you to Nick from MicMe for our awesome intro! Podcasting Articles and Links mentioned by Rob and Elsie Our SpeakPipe Feedback page! Leave us feedback :) Today in iOS Episode 500 Smartphone Apps FAQs Forecast Podcast.com Domain Name Acquired by Amazon Spotify will let its podcast hosts include full songs in their shows What is considered personal data under the EU GDPR? Recital 30 EU GDPR CCPA: personal information | CCPA Compliance With Cookiebot Monetize your podcast with Rob Walch Libsyn at Podcast Movement! Full schedule HELP US SPREAD THE WORD! We'd love it if you could please share #TheFeed with your twitter followers. Click here to post a tweet! If you dug this episode head on over to Apple Podcasts and kindly leave us a rating, a review and subscribe! Ways to subscribe to The Feed: The Official Libsyn Podcast Click here to subscribe via Apple Podcasts Click here to subscribe via RSS You can also subscribe via Stitcher FEEDBACK + PROMOTION You can ask your questions, make comments and create a segment about podcasting for podcasters! Let your voice be heard. Download the FREE The Feed App for iOS and Android (you can send feedback straight from within the app) Call 412 573 1934 Email thefeed@libsyn.com Use our SpeakPipe Page!
The iPhone event and what it means to podcasters, update on podcast apps that support video podcasts, Amazon Music troubleshooting, another easy win for podcast growth, speaking of growth, the difference between a spike and growth, recommending podcast artwork, a podcast privacy soap box, and geographic and user agent stats Audience feedback drives the show. We'd love for you to email us and keep the conversation going! Email thefeed@libsyn.com or call 412–573–1934. We'd love to hear from you! ATTEND GHOULS NIGHT OUT! SIGN UP FOR OUR NEWSLETTER HERE! Quick Episode Summary :13 Intro 4:08 PROMO 1: Legally Insane Films 4:46 Rob and Elsie Conversation Apple had their iPhone event! What matters to podcasters Podcast Addict does support actual video from video podcasts and othe updates from podcast apps Where are podcasts available in Amazon Music available? Troubles with trailers in Amazon Music We forgot “developing a podcast app!” as another easy win for podcast growth Elsie uses Forecast for chapter markers Nope, it's not a spike 31:07 PROMO 2: Lady Mouth You don't need to upload episode artwork, but we recommend it Norman Rodecaster weighs in on NR Podcast.com will not be changing hands anytime soon Why did you leave us? For a dream job! Spotify allows music in podcasts? Soap Box: Privacy 49:56 PROMO 3: About IBD Stats! Geographic and User Agent Where have we been? Where are we going? Featured Podcast Promos + Audio PROMO 1: Legally Insane Films PROMO 2: Lady Mouth PROMO 3: About IBD Thank you to Nick from MicMe for our awesome intro! Podcasting Articles and Links mentioned by Rob and Elsie Our SpeakPipe Feedback page! Leave us feedback :) Today in iOS Episode 500 Smartphone Apps FAQs Forecast Podcast.com Domain Name Acquired by Amazon Spotify will let its podcast hosts include full songs in their shows What is considered personal data under the EU GDPR? Recital 30 EU GDPR CCPA: personal information | CCPA Compliance With Cookiebot Monetize your podcast with Rob Walch Libsyn at Podcast Movement! Full schedule HELP US SPREAD THE WORD! We'd love it if you could please share #TheFeed with your twitter followers. Click here to post a tweet! If you dug this episode head on over to Apple Podcasts and kindly leave us a rating, a review and subscribe! Ways to subscribe to The Feed: The Official Libsyn Podcast Click here to subscribe via Apple Podcasts Click here to subscribe via RSS You can also subscribe via Stitcher FEEDBACK + PROMOTION You can ask your questions, make comments and create a segment about podcasting for podcasters! Let your voice be heard. Download the FREE The Feed App for iOS and Android (you can send feedback straight from within the app) Call 412 573 1934 Email thefeed@libsyn.com Use our SpeakPipe Page!
Bidemi is an NDPR and EU GDPR certified privacy rights law practitioner. A lawyer of about 15 years post-qualification experience in Nigeria and the African markets, Bidemi brings to bear core executive and managerial skills in helping clients (corporate, individual, and governments) navigate the complexities of data protection and global privacy rights in general. He has overseen the implementation of both the NDPR and GDPR at various corporate, individual, and governmental levels, with effectiveness, efficiency, and commerce at the center of his interventions. Bidemi is Lead Partner of the Commercial and Criminal Law Practice at AO2LAW and CEO at Taxaide and Taxtech; the chief conveners of the Africa Data Protection Conclave.
A special episode by Punit Bhatia wherein he shares a perspective on two years of EU GDPR. Part of this, Punit shares a perspective on 2 years of GDPR by looking at: - why was GDPR a big thing? - what have been the positives? - what challenges have remained? - what enforcement actions have taken place? And, what is the objective of GDPR? - what conclusions can we make and what to expect in the coming years? Punit Bhatia is the Founder and CEO of Ek Advisory, a privacy consultancy, helping companies of all sizes simplify and manage privacy compliance. Punit is known for providing advice that is pragmatic and free of legal jargon. Punit is also the author of all-time best eBook of GDPR named "Be Ready for GDPR". Listen to the conversation and share your views on what you think about it. --- Send in a voice message: https://anchor.fm/fit4privacy/message
Today's episode is one of those foundational episodes. We're discussing the 5 most important online tools you need in your business. These are tools that your business couldn't run without. These are fundamentals… and they are where proficiency is required because they will be touched on a regular basis. The first of these tools is your online home – that is your website. This website must live on it's own domain but can either be self-hosted WordPress or a hosted solution like Squarespace, Wix, Weebly or even a builder through your hosting platform. It doesn't really matter how your website is constructed. What matters that you have a consistent and reliable home base which can be the central hub for all the other online spokes. Your website can do a lot for you, but regardless of where things are at with regards to SEO and content marketing, having a place to call home online is super important. If you're not on a self-hosted WordPress website and want to delve into SEO and Content Marketing, make a plan to migrate your site in the next 6 – 12 months. The migration will boost your ability to leverage those techniques. But the key is to have the online home base first. It is extremely difficult to run an online business without an online home! The next tool that your business requires is an EMS. (We just did a series on email marketing so if you haven't listened to that, scroll back in your podcast app to episodes 58 – 63.) An EMS is an email address collection tool and a vehicle for sending out emails. Somewhere on your website, you'll have a simple form which allows a website visitor to sign up for a freebie or opt-in gift in exchange for providing you with their email address. The exact regulations as far as what you can do with that email address are beyond the scope of this episode. Be sure to check out the CAN/SPAM act and the EU GDPR regulations to make sure your email collection and usage are compliant. When looking for and researching an email marketing platform, or any piece of software really, it's not about evaluating the cost versus benefits as your business resides today. It's super important to put yourself 6 – 12 months down the road to figure out what to invest your time, energy and money in right now. So, while there is nothing inherently wrong with any one system you choose, the idea here is that you want a solution that won't be in need of replacement too soon nor will it be something you cannot fully utilize for eons. My top recommendations are on the resources page at https://techofbusiness.com/resources/ . The two EMS listed there are ConvertKit and ActiveCampaign. Both these solutions will work for you at the get go and be able to support your vision as your business blossoms. Our third tool is more a family of tools because the exact tool you use is going to differ greatly based on the type of business that you run. This family of tools is your content delivery mechanism. If you are supplying your clients with a full blown membership experience, you'll want to use a content delivery tool that provides the membership experience. If you are delivering a course, then a course delivery platform will do well. Now, if you are providing worksheets that go along with your one-on-one work or small group program, you might not need any fancy to deliver them… you could choose to use your website or a cloud storage location. Or you could, use the entry level version of a hosted platform like MemberVault or Thinkific. The important thing here is to know that you have a home for all the content that you want to deliver to your clients (and for that matter to your leads as well.) Do you know what? Back in episode 28 with Amanda Thebe, we discussed meeting your clients where they are, tech wise. And for that Amanda chose her content delivery tool to be email. She knew that the best chance for her clients to be successful with her program was for it to show up in their inbox every week. "When choosing a content delivery tool – be realistic with your time and energy and that of your audience as well. I believe that using MemberVault or Thinkific for content delivery is not going to steer you wrong." - Jaime Slutzky" Right on the heels of delivering content we need to discuss is a mechanism for taking payments. We can't exactly deliver our products if we can't sell them! The two most popular flavors of online payments are Stripe and PayPal. And the biggest difference between the two options is how the transaction is processed. With PayPal you'll have payment buttons on your website that will direct your client over to the PayPal website to perform the transaction and then PayPal will send them back to your website once complete. The entire payment process resides within the PayPal website and therefore your business will not be in contact with the client's sensitive payment information. PayPal has become an industry standard. A PayPal business account is free to open and you are charged a fee, based on the amount of the transaction, for using this service. Stripe has approached online payments differently. In this case, Stripe transactions happen “in line” on your website. There is no transfer of the client from your website to the Stripe system and back. What this means for us, is that it is now our responsibility to own and maintain the appropriate online security protocols. I love Stripe because it allows us to have our clients remain in our environment throughout the transaction. Stripe is also free to setup and they charge a fee just like PayPal does. In general, the Stripe fee is slightly lower than PayPal but because there is the overhead of security, they are pretty much as wash. If you've selected a tool like MemberVault or Thinkific, they have direct integrations with PayPal and Stripe. Their integration with Stripe is likely what you'll see as “native” and what I would use. This is how the online infrastructure of your business can get exponentially complicated – suddenly we're using MemberVault or Thinkific for both content delivery and brokering our payment processing. And seriously, this is one of the primary reasons I recommend having a tech stack diagram. It's important to know where things live and how they interact with one another. Let's boil this tool down to its lowest common denominator. Let's make it easy for your clients to make their payments! Simple as that – staying out of the payment process is going to help you immensely. If your clients can “self-serve” this side of things you can focus on over-delivering what they have purchased! The final tool that I recommend all online service providers implement is scheduling software. For this, my top pick is Acuity Scheduling. I have three reasons for recommending scheduling software: When you're in online business you'll have the opportunity to have clients in other time zones. Scheduling software takes this into account. Your clients will be able to easily see your calendar in their time zone and make appropriate decisions. Scheduling software makes it so much easier to nail down a time that works for both you and your client. Before our clients become clients, we often offer discovery calls or other such “good fit” calls. It's great to be able to publish this availability on your website, on social media and in your emails. You never know where your next client is going to come from. Making it super easy for them to raise their hand and say that they are interested in working with you should be a primary motivation. And a bonus reason for having scheduling software – there are built in reminder emails in most of these systems which greatly reduces the number of no-shows! With these five tools – website, email marketing, content delivery, payment and scheduling, you have everything you need to run a successful and profitable business. Are you looking for more success? More profit? More organization, systems and structure within your online tech tools? Well then, let's book your Tech Audit today. During our 55-minute session we'll get into all the tools that you have in place and get your tech foundation squared away. Just go to https://techofbusiness.com/audit/ to get started. "Everything we implement online for our businesses sets us up for future success."- Jaime Slutzky If you're listening in real time, it's summertime here in the Northern Hemisphere! AND we're officially halfway through 2019! There are a few things I want you to think about: What do you want to accomplish in the next 6 months? Do you have tech that isn't supporting that vision? Are you missing a fundamental tool or do you have extra online hoops that need to be eliminated to make things easier for you, your clients and your team? Start with your website and email marketing. Once those pieces are functionally working better then move on to streamlining your content delivery, payment processing and scheduling needs. And be sure to tune in to next week's episode. I'm going to debunk 5 tools that people think they need but in reality are unnecessarily going to over-complicate things! Connect with Jaime: Instagram: @techofbusiness Twitter: @techofbusiness Facebook: @yourbiztech LinkedIn: https://www.linkedin.com/in/jaimeslutzky/ Email: jaime@techofbusiness.com Book Your Tech Audit
The debut episode of GovTech360 features two GT Doers, Dreamers and Drivers.From the Market Navigator Studios, we talk to Nebraska Chief Information Officer Ed Toner and Seattle Chief Privacy Officer Ginger Armbruster about their award-winning work. Show Notes: - Growing your own Agile development team of millennials who code @ 1:58. - Organic Agile training after they come out of college and join your team @ 3:45. - Stronger privacy protections in the embrace of smart city technologies @ 6:05. - Public records and privacy: what we should not know @ 8:30. - Sorry states and locals: The EU GDPR may make federal preemption the only path forward @ 10:25. - What GovTech Startups often miss about privacy in their business models - less is often more and the legal landscape is fraught @ 11:35 - Dustin's Takeaways: On workforce (14:20) and privacy (14:55)
There are growing concerns about privacy and the security of data provided to hotels, along with increasing safety concerns. • How many different entities get your personal data when you check into a hotel? • How many third parties have access to your personal data through the hotel? • What types of activities that you do in your room that are often put into the hotel system? • What types of actions can hotels take to help them improve their systems and data security and better protect the privacy of their guests? • What are the most challenging requirements within regulations such as the EU GDPR and California CPA for hotels to meet? • What are a few tips for travelers for protecting their own privacy? Tune in to hear Rebecca discuss these topics and more with Chris Zoladz, founder of Navigate LLC and former VP of Information Protection & Privacy at Marriott International.
2018 privacy hero of the year, Tara Taubman-Bassirian, discusses the EU GDPR, the increasing need for protecting privacy in the increasingly technology-rich environment, and some activities for Data Privacy Day on January 28, 2019. What are the benefits of GDPR? Where can it be improved upon? What do companies struggle with most for GDPR compliance? What is a “hot potato” GDPR issue? How are binding corporate rules (BCRs) used for non-adequate countries? How has Brexit impacted GDPR compliance? Why does privacy matter? What are the current largest threats to privacy? What are some activities for Data Privacy Day? Hear Tara discuss these topics, and more, with Rebecca.
On May 25, 2018, the EU General Data Protection Regulation (GDPR) goes into effect, bringing with it some significant changes to how organizations were protecting personal information under the EU Data Protection Directive. In this episode we discuss this with a couple of GDPR experts who have been deep into the weeds in helping organizations to implement the changes necessary to comply with the GDRP. And this certainly is a hot topic! I did an online news search on Feb 7, and there were 114,000 distinct news articles on this topic, with an unlimited number of opinions, warnings, and sky-is-falling predictions. Join our lively discussion with these two GDPR experts, who are based and work in the EU, to sort out some of the GDPR fictions from the facts, along with giving us some great advice.
On May 25, 2018, the EU General Data Protection Regulation (GDPR) goes into effect, bringing with it some significant changes to how organizations were protecting personal information under the EU Data Protection Directive. In this episode we discuss this with a couple of GDPR experts who have been deep into the weeds in helping organizations to implement the changes necessary to comply with the GDRP. And this certainly is a hot topic! I did an online news search on Feb 7, and there were 114,000 distinct news articles on this topic, with an unlimited number of opinions, warnings, and sky-is-falling predictions. Join our lively discussion with these two GDPR experts, who are based and work in the EU, to sort out some of the GDPR fictions from the facts, along with giving us some great advice.
Your data is a fundamental right, according to Dimitri Sirota, CEO of BigID, and everyone "has a legal right to their data." "Companies that…collect and process [the] data don't own it." With that shot fired, Sirota describes how the EU is taking the global lead on this with legislation (the General Data Protection Regulation, or GDPR) outlining what companies are required to do in tracking and monitoring consumer data. He reveals not only which types of data must be managed and protected but also how companies are required to comply when a consumer asks for their own data. Sirota also explains the necessity for the harsh penalties that are incurred when businesses don't comply—and why some penalties are even more severe than required. He further defends the strict penalties with three examples of successful innovations brought about by strict compliance requirements. In this podcast, you'll also learn: * Two ways in which the EU GDPR is notable and is paving the way for action in places like Canada, China, Australia, and Japan * How the Internet of Things (IoT) will be impacted * Four ways these guidelines will benefit the companies themselves, despite the strict regulations and harsh penalties to protect consumers Listen, Share and Subscribe to get the latest, news and updates in technology. Contribute Bitcoin to fuel our interviews and keep us going!