POPULARITY
As chief privacy officer of the biggest city in the United States, it's safe to say that Michael Fitzpatrick doesn't have your normal, run-of-the-mill job. As part of New York's Office of Technology and Innovation, the Office of Information Privacy provides guidance to more than 175 agency privacy officers across the city. It also works closely with the city's Cyber Command and has partnered with the Cities Coalition for Digital Rights and the Biometrics Institute. IAPP Editorial Director Jedidiah Bracy caught up with Fitzpatrick to learn more about his work as CPO of New York City, how his office works across government and what he sees as some of the biggest challenges in privacy and cybersecurity.
We're back for Episode 11 of the Mania Podcast, here's what we covered this week: 00:00 Introduction and Personal Revelations 02:08 IVF Journey and Updates 05:56 Navigating Political Podcasts 11:28 Conversations on Homelessness and Empathy 18:35 Exploring Modern Sexuality and Its Implications 23:00 TikTok, Freedom, and Information Privacy 25:21 The TikTok Dilemma 30:27 Social Media's Impact on Mental Health 39:08 The Justin Baldoni Lawsuit 46:34 The Power of Belief in Allegations 50:48 Blackmail and Privacy Concerns 51:17 The Impact of Digital Manipulation on Youth 52:37 Building Emotional Resilience in Children 54:51 Navigating the Dangers of the Internet 58:08 The Tragic Case of Stephen 'Twitch' Boss 01:01:02 Ethics of Sharing Personal Stories Posthumously 01:07:19 Rehabilitation vs. Punishment in Criminal Justice This week the conversation dives into a wide range of personal and societal topics, weaving together stories and insights that touch on everything from the IVF journey and political podcasting to homelessness and modern sexuality. The hosts share heartfelt anecdotes and emphasize the value of empathy and understanding in tackling complex social issues. They take a closer look at TikTok, discussing its impact on mental health, privacy concerns, and how it shapes the way we interact online. The conversation also delves into the Justin Baldoni lawsuit involving Blake Lively and Ryan Reynolds, unpacking themes of belief, skepticism, and the absurdity of blackmail attempts in today's digital age. The discussion goes deeper into how the internet and digital manipulation affect young people, stressing the importance of emotional resilience for kids growing up in a hyper-connected world. They reflect on the tragic loss of Stephen "tWitch" Boss exploring the ethics of sharing personal stories after someone's passing. Finally, ANegs and DNegs debate the balance between rehabilitation and punishment in the criminal justice system, advocating for a more compassionate and humane approach to addressing crime and its root causes. It's a thoughtful, engaging conversation that encourages listeners to reflect on these pressing issues. Finally, Amanda can't handle Daniel's antics to end the show, so tune in to the end! Check out my MasterClass: https://www.masterclass.com/classes/daniel-negreanu-teaches-poker Use PROMO CODE KIDPOKER20 to get 20% off at https://contendersclothing.com/?rfsn=2748061.19d46 Check out my MANIA Podcast at https://podcasts.apple.com/us/podcast... and subscribe on iTunes. Follow Me, Daniel Negreanu, Online Here: https://linktr.ee/dnegspoker https://twitter.com/RealKidPoker https://www.instagram.com/dnegspoker/ https://www.facebook.com/DNegsPoker
In this episode, Jamal sits down with Veronica Canton, a seasoned privacy expert, to uncover the secrets to supercharge your privacy career through strategic networking. Veronica shares her personal journey of overcoming obstacles and building a thriving network that has propelled her career to new heights.Discover:Practical tips on cultivating meaningful connections The best ways to leverage platforms like LinkedIn, and contribute value to the privacy community. How to build a strong support system Secrets to increase your visibility and open doors to endless opportunitiesVeronica and Jamal also dive into the power of mentorship, both as a mentor and mentee, and how it can accelerate your growth in the industry.Whether you're just starting out or looking to take your privacy career to the next level, don't miss this chance to hear from two industry leaders on the transformative impact of networking done right. Veronica Canton is Senior Principal Legal Counsel, Privacy, & ESG at an AI technology company. She is a distinguished legal professional with extensive expertise in privacy law and data protection. Veronica has established herself as a leading authority in navigating the complex intersection of law, technology, and privacy rights. She is a Certified Information Privacy Professional for the United States and Europe, Certified Information Privacy Manager and Fellow of Information Privacy. Veronica recently launched The Canton Privacy, Tech, & AI Report, a monthly LinkedIn newsletter where she shares practical tips on data privacy, tech, and AI. She is also a member of the Latinas in Cyber Advisory Board.Follow Jamal on LinkedIn: https://www.linkedin.com/in/kmjahmed/Follow Veronica on LinkedIn: https://www.linkedin.com/in/veronicacanton/Ready to become a World Class Privacy Expert? Book your call to join the World's Leading Privacy Program
Want to launch or accelerate your career in privacy? Join award-winning privacy expert Jamal Ahmed as he interviews Veronica Canton, Senior Principal Legal Counsel specialising in Privacy and ESG at an AI technology company. In this value-packed episode, Veronica shares:Her inspiring journey from general practice attorney to privacy specialistShe reveals how she overcame the common "no experience" hurdleAnd the eight essential skills every privacy professional should developYou don't want to miss the episode!Veronica Canton is Senior Principal Legal Counsel, Privacy, & ESG at an AI technology company. She is a distinguished legal professional with extensive expertise in privacy law and data protection. Veronica has established herself as a leading authority in navigating the complex intersection of law, technology, and privacy rights. She is a Certified Information Privacy Professional for the United States and Europe, Certified Information Privacy Manager and Fellow of Information Privacy. Veronica recently launched The Canton Privacy, Tech, & AI Report, a monthly LinkedIn newsletter where she shares practical tips on data privacy, tech, and AI. She is also a member of the Latinas in Cyber Advisory Board.Follow Jamal on LinkedIn: https://www.linkedin.com/in/kmjahmed/Follow Veronica on LinkedIn: https://www.linkedin.com/in/veronicacanton/Ready to become a World Class Privacy Expert? Book your call to join the World's Leading Privacy Program
Is the EU AI Act about on product safety or fundamental rights? Join us in this enlightening episode of The FIT4Privacy Podcast wherein the host Punit Bhatia sits down with Caro Robson, a leading expert in AI regulations. Together, they explore the aspect of the AI Act being a safety-oriented framework than a just a rights protection safeguard. Caro also dives into the vital roles of international standards from bodies like OECD, UNESCO, ISO, and NIST, and discusses conformity assessment, compliance procedures, and the concept of regulatory sandboxes. Uncover how these developments align with GDPR and what they mean for the future of AI systems, especially in high-risk applications. This conversation is a must for anyone keen on understanding the intricate balance between regulation and innovation in the AI landscape. Tune in to Episode 119, Season 5, and subscribe to The FIT4Privacy Podcast for more insightful dialogues. If you find our content valuable, please leave a review and share it with others interested in the evolving world of AI regulation. KEY CONVERSATION POINT Introduction How Caro Robson got into the privacy space Understanding the need for EU AI Act Why did the EU push for the EU AI Act Will there be similarities in regulation? How EU AI Act can help protect already set product standards Will EU AI Act apply to products which aren't in the market yet? Can companies categorize systems from high risk to low risk? Final message ABOUT THE GUEST Caro is a renowned expert and leader in digital regulation. She is a passionate advocate for ethical AI and data governance, with over 15 years' global experience across regions and sectors, designing and embedding practical solutions to these challenges. Caro has worked with governments, international organisations and multinational businesses on data and technology regulation, including as strategy executive for a regulator and leader of a growing practice area for a prominent public policy consultancy in Brussels. Caro was recently appointed UK Ambassador for the Global AI Association and is an expert observer to the UNECE Working Party on Regulatory Cooperation and Standardization Policies (WP.6), Group of Experts on Risk in Regulatory Systems. Caro holds an Executive MBA with distinction from Oxford, an LLM with distinction in Computer & Communications Law from Queen Mary, University of London, and is a Fellow of Information Privacy with the International Association of Privacy Professionals. She has contributed to legal textbooks, publications, and research on privacy and data governance, including for the EU, ITU and IEEE. ABOUT THE HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organization culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentor and coach privacy professionals. Punit is the author of books “Be Ready for GDPR” which was rated as the best GDPR Book, “AI & Privacy – How to Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured amongst top GDPR and privacy podcasts. As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's value to have joy in life. He has developed the philosophy named ‘ABC for joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe. RESOURCES Websites www.fit4privacy.com, www.punitbhatia.com Podcast https://www.fit4privacy.com/podcast Blog https://www.fit4privacy.com/blog YouTube http://youtube.com/fit4privacy
Ever wondered what separates good Privacy Pros from EXCEPTIONAL ones?In this episode of the Privacy Pros Podcast, Jamal Ahmed hosts Dr. Valerie Lyons, a seasoned privacy leader and author of the Privacy Leader Compass. They discuss:Transitioning from cybersecurity to privacy The key differences between good and exceptional privacy professionalsHow to balance technical skills, business acumen and soft skills Qualities that allow Privacy Pros to create maximum impactThis is a must listen episode for anyone who wants to understand how to turn adversity into strength.Dr. Lyons is author of the ‘The Privacy Leader Compass', and leading authority on privacy as a CSR and ESG. Included in the ‘Top 100 Women in Cybersecurity in Europe', Dr. Lyons is an accomplished and driven cybersecurity and privacy leadership expert. Her career spans over 30 years - working in both cybersecurity and privacy teams. She has worked for several global organisations, such as IBM, KPMG, and ABB, and served as Head of Information Security Risk in KBC Bank for almost 15 years. Dr. Lyons is director and Chief Operations Officer in BH Consulting since 2015. She has an in-depth knowledge of European data protection law and practices, and frequently presents at renowned international security and privacy conferences (such as RSA, COSAC, ISACA and CPDP). She has also lectured in Dublin City University on Privacy, Cybersecurity and Digital Ethics. In 2022, Dr Lyons was awarded a PhD in Information Privacy for her research into Privacy as a CSR. She also holds a Masters in Leadership, along with a post-graduate diploma in Executive Coaching. She is a certified CISSP for almost 25 years, a CDPSE for four years, and is a member of the Institute of Directors in Ireland.Follow Jamal on LinkedIn: https://www.linkedin.com/in/kmjahmed/Follow Dr. Valerie on LinkedIn: https://www.linkedin.com/in/valerielyons-privsec/Ready to become a World Class Privacy Expert? Book your call to join the World's Leading Privacy Program
This podcast is packed with valuable insights and actionable advice to help you understand and navigate the new AI regulations with experts Alessandro Mauro, Caro Robson, Punit Bhatia and Saurabh Gupta. In this episode, we discussed what does the EU AI Act mean for businesses? What are the real-world challenges businesses face when considering AI adoption? What are the risks? Join us for an engaging and informative podcast, filled with comprehensive expert perspectives and practical tips to the EU AI Act. KEY CONVERSION POINT: 00:01:33 Introducing the Panel 00:04:20 Recap from Panel 1 00:07:00 What does EU AI Act mean in businesses? 00:13:02 What's the classification of risk in EU AI Act? 00:17:33 How to manage risk in general and in the context of EU AI Act? 00:24:01 What are the real-world challenges for businesses who are thinking about using AI? 00:32:44 Case studies and incidents that exemplify the challenges 00:40:58 How do you see the enforcement and governance? 00:47:35 Recommendations for companies ABOUT THE GUEST Alessandro Mauro is a risk management professional with 25+ years of experience. Focusing on excellence and responsibility. A team builder with a can-do attitude paired with a lot of prudence. Throughout his career, he has been built from foundations successful risk management departments in start-ups and established companies. He assumed managerial roles of increasing responsibility, built around the selection, training, and management of multi-national groups of people, being part of top management, and reporting to the Company CEOs. Caro Robson is a seasoned leader and expert in technology and data regulation. She is passionate advocate for ethical AI and data governance with over 15 years global experience across sectors, designing and embedding practical solutions to these challenges. She worked with governments, international organizations and multinational businesses on data and technology regulation, including as strategy executive for a regulator and leader of a growing practice area for prominent public policy consultancy in Brussels. She was recently appointed UK Ambassador for the Global AI Association and expert observer to the UNECE Working Party on Regulatory Cooperation and Standardization Policies (WP.6), Group of Experts on Risk Management in Regulatory Systems. She holds an Executive MBA with distinction from Oxford, an LLM with distinction in Computer & Communications Law from Queen Mary, University of London, and is a Fellow of Information Privacy with the International Association of Privacy Professionals. Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organization culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentor and coach privacy professionals. Punit is the author of books “Be Ready for GDPR'' which was rated as the best GDPR Book, “AI & Privacy – How to Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured amongst top GDPR and privacy podcasts. As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's value to have joy in life. He has developed the philosophy named ‘ABC for joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe. Saurabh Gupta Saurabh Gupta is the Founder and CEO of PlumCloud Labs, a company that specializes in GDPR compliance in the SalesForce ecosystem. RESOURCES Websites www.fit4privacy.com, www.punitbhatia.com Podcast https://www.fit4privacy.com/podcast Blog https://www.fit4privacy.com/blog YouTube http://youtube.com/fit4privacy
Kabir Barday's career journey illustrates the power of innovation in privacy. As the Founder, CEO, and Chairman of OneTrust, he has transformed the landscape of privacy automation. He holds a Fellow of Information Privacy with the IAPP, the highest designation of a privacy professional, and is a Henry Crown Fellow at the Aspen Institute. With a BS in Computer Science from the Georgia Institute of Technology, where he serves on the Georgia Tech Advisory Board (GTAB), Kabir continues to lead OneTrust in setting new standards for privacy automation and responsible AI. In this episode… Many companies struggle with responsible use of data, AI, and creating privacy programs. From ethical data use to complying with evolving privacy laws and using new AI tools, it can be challenging for companies, especially with manual processes. How can businesses and privacy professionals ease the burden of manual privacy work and keep up with regulations? Trust has become a fundamental societal trend, so businesses must facilitate trusted interactions with customers and stakeholders by embedding privacy controls into the user experience. Fortunately, there is OneTrust, the company revolutionizing responsible use of data, AI, and privacy management with its proprietary software that automates privacy processes, helps organizations comply with regulations, and builds trust with customers. Kabir Bardy, Founder, CEO, and Chairman of the Board at OneTrust, joins Jodi and Justin Daniels on this week's episode of She Said Privacy/He Said Security to discuss OneTrust's innovative approach to privacy, automation, and AI. Kabir shares AI and privacy trends from Trust Week 2024, how OneTrust champions responsible use of data and AI, and how companies can evolve their privacy programs at various maturity levels.
Welcome to the “Tech Policy Grind” podcast by the Internet Law & Policy Foundry! In this episode, Foundry Fellow Katelyn Ringrose sat down with Jay Stanley, Senior Policy Analyst, at the ACLU's Speech, Privacy, and Technology Project, to discuss Jay's work on aerial surveillance law and policy, with a spotlight on the work that the ACLU is doing to keep you safe from eyes in the sky. While these two drone on about aerial surveillance (no pun intended), check out some of the resources listed below. This episode will be part of a mini-series on surveillance law and policy with some amazing future guests, so thank you for listening, and stay tuned for our next episode! DISCLAIMER: Katelyn engaged with this episode by the Internet Law & Policy Foundry voluntarily and in their personal capacity. The views and opinions expressed on this show do not reflect the organizations and institutions they are affiliated with. Bios: Jay Stanley started working on privacy and technology issues at the ACLU five weeks before 9/11. His role at the ACLU is to help the organization think through, monitor, and explain the impact of new technologies on our privacy, free speech and other civil liberties. He has worked on a wide variety of cutting-edge science and technology issues and authored and co-authored a variety of influential ACLU reports, policy papers, and blog posts. Among his current areas of focus are aerial surveillance, digital identity, digital currency, and license plate scanners. Before joining the ACLU, he worked as an analyst at the technology research company Forrester Research, and did graduate studies in 20th century American history at UVA (ABD). As Google's Global Policy Lead for Law Enforcement and Government Access, Katelyn Ringrose works on any and all issues tied to data governance. Prior to her current position, Katelyn served as the Future of Privacy Forum's Christopher Wolf Diversity Fellow — working on data privacy and security. Through the International Association of Privacy Professionals, Katelyn holds CIPM, CIPP-EU, and CIPP-U certifications & is a 2021 Fellow of Information Privacy. Katelyn was chosen as a 2022 Out in National Security Leader, and is a former board member for Women in Security and Privacy (WISP) in Washington, DC. She writes about issues tied to state/federal privacy legislation; sensitive personal data; and appropriate safeguards for cross-border transfers. Find Katelyn's law reviews and articles in Berkeley Tech Law Journal, Berkeley Law Review, Denver Law Review, Notre Dame Journal of Emerging Technology, Notre Dame Law Review, on IAPP and FPF's websites, and more. Resources: ACLU White Papers Eye-in-the-Sky Policing Needs Strict Limits Press on surveillance in the sky ‘Drones as first responders' programs need guardrails, says ACLU Key drones-related court cases ACLU v. CBP - FOIA Case for Records Relating to Government's Aerial Surveillance of Protesters Leaders of a Beautiful Struggle v. Baltimore Police Department
Martin Abrams knows a little something about information privacy and consumer policy. Over the course of the last 40-plus years, Abrams has had his hands in a number of initiatives, including as co-founder and president of the Center for Information Policy Leadership and founder of the Information Accountability Foundation. He took part in the development of the APEC Cross Border Privacy Rules and the OECD's Working Party on Information Security and Privacy. Abram's work on transparency and accountability has been influential on policy makers around the world. At the latest Global Privacy Assembly in Bermuda, Abrams announced he was retiring from his full-time position at IAF and taking more time to be with his family. IAPP Editorial Director Jedidiah Bracy caught up with Abrams to take a look back at his career, the changes he's seen in information policy and where he thinks data policy and regulation are heading.
Matthew Fraser is New York City's Chief Technology Officer of the Office of Technology & Innovation (OTI). The Chief Technology Officer plays a central role in City government, coordinating technology-related projects and policy Citywide. The Chief Technology Officer leads the Office and Technology and Innovation which is a consolidation of the Department of Information Technology and Telecommunications, and the former NYC Cyber Command Center, the Mayor's Office of Information Privacy, the Mayor's Office of Data Analytics, and the Algorithms Management and Policy Officer. Consolidating the City's entire IT agency portfolio, CTO Fraser is uniquely qualified to put forward a central strategy that will bring agility, efficiency, and modernization to the City's IT infrastructure. He is committed to democratizing technology. He oversees projects to expand broadband and make City services easier to use for all. CTO Fraser also runs the Joint Security Operations Center (JSOC). JSOC is a new cybersecurity hub that allows city, state, and federal entities to coordinate efforts against cyber threats.Key Topics:NYC's Cybersecurity EffortsHow NYC is Handling the Use of Artificial IntelligenceNYC's Ban on TikTokNYC's Use of Facial Recognition NYC's MyCity PlatformNYC's Initiative to Provide Access to Broadband with Big Apple ConnectSign up for the Some Future Day Newsletter here: https://marcbeckman.substack.com/To join the conversation follow Marc here:YoutubeLinkedInTwitterInstagramMarc is a Senior Fellow of Emerging Technologies at NYU, the CEO of DMA United, and is on the New York State Bar Association's Taskforce for Cryptocurrency and Digital Assets.Some Future Day is produced and edited by Jon Bumhoffer at Make More Media
BIPA is the currently the most important topic in customer support. It's a pitfall for all companies that are running customer voices through AI systems. In short, this legislation imposes a penalty every time a person's voiceprint is captured without written consent. The penalty is $1,000 for every negligent violation, and $5,000 for every reckless or intentional violation.This episode is an explanation of BIPA from a customer support perspective. To follow the host, John Walter, on LinkedIn, here's his profile: https://www.linkedin.com/in/jowalter/To read an article John wrote about BIPA on LinkedIn, see here: Billion Dollar Voiceprints -- Don't Fall Into the BIPA Trap
In this bonus episode, our producer B.J. Mendelson sits down with science fiction author and journalist Cory Doctorow. This is a great chat about the current state of the Internet economy, the continuing issues we face in terms of privacy and protecting ourselves from fascists and weirdos, and what actions we can take to address these challenges.Full show notes and transcript to come.Support The Show Our Sponsor: DuckDuckGo *Affiliate Link: 1Password.com *Affiliate Link: Delete Me *Affiliate Link: Marshall Rosenberg's book, Non-Violent Communication Get Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal here. BJ's First Privacy Book: Audible *You don't need to use these affiliate links. They don't cost you anything extra to use. But. IF you do use these links, it'll kick a couple of dollars our way to help support this project.For more news and tips concerning maintaining your privacy and security, we recommend listening to our friends at Smashing Security. Reserve Your SeatBJ Mendelson and Amanda King are the authors of the upcoming book, "How to Protect Yourself From Fascists and Weirdos." They are designing an email-based course around the topics discussed in the book and on our show. So, if you want more information on how to protect yourself from fascists and weirdos, complete with step-by-step details and tutorials, we recommend reserving a seat for the course.All you need to do is email us at BJMendelson@Duck.com with "Privacy Course" in the subject line.We'll make sure to let you know when this course becomes available for purchase.Did You Know?In this week's book excerpt, you can hear Roger reference the big Equifax data breach. This book was written in 2017. On February 26th, 2023, BJ got a $5 rebate from Equifax for this data breach. You probably did too. That's absolutely ridiculous. And further proof that credit reporting agencies shouldn't exist.***Photo for today's episode provided by Mohammad DanishNeed a Privacy Audit?We are giving away all of our tips and strategies to help protect you from fascists and weirdos FOR FREE.But. We've found some people prefer or need a more 1-1 setting based on their situation.So, we offer privacy audits where BJ will walk you through each step and recommendation from this show and answer any questions you may have.You can book a Privacy Audit by emailing BJ at BJMendelson@Duck.com. Make sure to include Privacy Audit in your subject line.Audits cost $200 and take place over two one-on-one secure video calls via Signal. The first call will walk you through the checklist, and the second call, scheduled for a week later, will see how you're doing with the implementation and answer any remaining questions you may have.
Dr. John Gartner sits down with our producer, B.J. Mendelson, to discuss how to combat cults. This is important to hear because fascists are just cults with guns. So let's hear from the expert on what to look out for, how to deal with the cults, and what to do if you find yourself dealing with one.Support The Show Our Sponsor: DuckDuckGo *Affiliate Link: 1Password.com *Affiliate Link: Delete Me *Affiliate Link: Marshall Rosenberg's book, Non-Violent Communication Get Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal here. BJ's First Privacy Book: Audible *You don't need to use these affiliate links. They don't cost you anything extra to use. But. IF you do use these links, it'll kick a couple of dollars our way to help support this project.For more news and tips concerning maintaining your privacy and security, we recommend listening to our friends at Smashing Security. Reserve Your SeatBJ Mendelson and Amanda King are the authors of the upcoming book, "How to Protect Yourself From Fascists and Weirdos." They are designing an email-based course around the topics discussed in the book and on our show. So, if you want more information on how to protect yourself from fascists and weirdos, complete with step-by-step details and tutorials, we recommend reserving a seat for the course.All you need to do is email us at BJMendelson@Duck.com with "Privacy Course" in the subject line.We'll make sure to let you know when this course becomes available for purchase.Did You Know?In this week's book excerpt, you can hear Roger reference the big Equifax data breach. This book was written in 2017. On February 26th, 2023, BJ got a $5 rebate from Equifax for this data breach. You probably did too. That's absolutely ridiculous. And further proof that credit reporting agencies shouldn't exist.***Photo for today's episode provided by Mohammad DanishNeed a Privacy Audit?We are giving away all of our tips and strategies to help protect you from fascists and weirdos FOR FREE.But. We've found some people prefer or need a more 1-1 setting based on their situation.So, we offer privacy audits where BJ will walk you through each step and recommendation from this show and answer any questions you may have.You can book a Privacy Audit by emailing BJ at BJMendelson@Duck.com. Make sure to include Privacy Audit in your subject line.Audits cost $200 and take place over two one-on-one secure video calls via Signal. The first call will walk you through the checklist, and the second call, scheduled for a week later, will see how you're doing with the implementation and answer any remaining questions you may have.
Just joining us here at Stupid Sexy Privacy? Looking for an episode that tells you everything you need to protect yourself from fascists and weirdos? Look no further!We'll have longer show notes here soon, but for now, enjoy this lively discussion between BJ Mendelson, Amanda King, and Rosie Tran as they look into the future of how to protect yourself and your information online.Support The Show Our Sponsor: DuckDuckGo *Affiliate Link: 1Password.com *Affiliate Link: Delete Me *Affiliate Link: Marshall Rosenberg's book, Non-Violent Communication Get Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal here. BJ's First Privacy Book: Audible *You don't need to use these affiliate links. They don't cost you anything extra to use. But. IF you do use these links, it'll kick a couple of dollars our way to help support this project.For more news and tips concerning maintaining your privacy and security, we recommend listening to our friends at Smashing Security. Reserve Your SeatBJ Mendelson and Amanda King are the authors of the upcoming book, "How to Protect Yourself From Fascists and Weirdos." They are designing an email-based course around the topics discussed in the book and on our show. So, if you want more information on how to protect yourself from fascists and weirdos, complete with step-by-step details and tutorials, we recommend reserving a seat for the course.All you need to do is email us at BJMendelson@Duck.com with "Privacy Course" in the subject line.We'll make sure to let you know when this course becomes available for purchase.Did You Know?In this week's book excerpt, you can hear Roger reference the big Equifax data breach. This book was written in 2017. On February 26th, 2023, BJ got a $5 rebate from Equifax for this data breach. You probably did too. That's absolutely ridiculous. And further proof that credit reporting agencies shouldn't exist.***Photo for today's episode provided by Mohammad DanishNeed a Privacy Audit?We are giving away all of our tips and strategies to help protect you from fascists and weirdos FOR FREE.But. We've found some people prefer or need a more 1-1 setting based on their situation.So, we offer privacy audits where BJ will walk you through each step and recommendation from this show and answer any questions you may have.You can book a Privacy Audit by emailing BJ at BJMendelson@Duck.com. Make sure to include Privacy Audit in your subject line.Audits cost $200 and take place over two one-on-one secure video calls via Signal. The first call will walk you through the checklist, and the second call, scheduled for a week later, will see how you're doing with the implementation and answer any remaining questions you may have.
Donna Gallaher is the President and CEO of New Oceans Enterprises. New Oceans Enterprises is a Cyber, IT, and Operational Risk Management Advisory Service that facilitates collaboration among your company's business units to develop policies and operational risk mitigation strategies appropriate for your risk tolerance. Donna was recently recognized as one of the top 12 vCISO Influencers to watch and inducted into EC Council's 2023 C|CISO Hall of Fame. Donna currently serves on the Board of Advisors for the FAIR Institute and is President of the Atlanta FAIR Chapter. She is one of the founding members of vCISO Catalyst, a professional association for vCISOs. She holds CISSP, CCISO, CIPP/E, CIPM and ITIL, and Open FAIR certifications and is designated a Fellow of Information Privacy by IAPP. She is a graduate of Auburn University with a Bachelor of Science in Electrical Engineering. In this episode… In this age of technology, it's wise for companies to have some sort of cybersecurity expert on staff to protect the organization's data from theft and damage. But what happens if you're a startup or small company and unable to afford a full-time expert? Or perhaps you're a larger corporation with cyber technology in need of updating? Whatever your company's needs are, you may want to enlist the services of someone like Donna Gallaher, a securities strategist who owns a securities advisory firm that contracts out services. Firms like Donna's can provide a list of options to protect your company's data, intellectual property, and assets. Tune in to this informative episode of the She Said Privacy/He Said Security Podcast as Jodi and Justin Daniels welcome Donna Gallaher, President and CEO of New Oceans Enterprises, to discuss the role of a CISO. Donna explains the services a CISO offers, why smaller companies are prime targets for hackers, and how to prevent cybersecurity threats.
Show Note: We're back! Pardon our delay. BJ is dealing with a (totally minor) medical issue that required surgery. So we've been out of commission longer than planned.In today's episode, Amanda and Rosie talk about disinformation, what it is, how to spot it, and how to navigate our new media landscape that's flooded with AI-generated falsehoods and videos. This week's guest: Nina Jankowicz. Former Executive Director of the Disinformation Governance Board of the United States. Nina is also the author of one of our favorite books, "How to be a Woman Online."(Note: This interview was recorded at the end of 2022, before the announcement of Nina suing Fox News.)***Photo by Anna Tarazevich: https://www.pexels.com/photo/scam-alert-letting-text-on-black-background-5697256
The BTLJ Podcast team sits down with Tatiana Rice from the Future of Privacy Forum to explore the fascinating world of biometrics and its role in a recent case, Barnett v. Apple, which involves a dispute over Apple's use of facial recognition and Touch ID technology.
For the 54th episode of the CIO podcast hosted by Healthcare IT Today, we are joined by Natalie Pageler, MD, CMIO at Stanford Medicine Children's Health to talk about patient information privacy! To kick things off, Pageler shares some of the unique challenges that exist with data privacy for children. Then we shift into the […]
Personal Branding For A Career in Privacy with Jamal Ahmed in The FIT4Privacy Podcast GDPR can be complex. GDPR can be challenging. But not for Jamal and Punit who have a free-flowing conversation on self-branding for privacy pros, finding jobs, the role of certifications, and the difference between teaching and coaching. Let us hear host Punit Bhatia with our guest Jamal Ahmed talk about the privacy careers in GDPR. KEY CONVERSATION POINTS 00:00:00 Intro 00:04:07 About Self-Branding 00:14:07 How do I find a Job? 00:23:50 Difference between Teaching and Coaching Approach 00:31:22 About Jamal Ahmed ABOUT THE GUEST Jamal is an astute and influential Privacy Consultant, strategist, Board advisor, and Fellow of Information Privacy. He is a charismatic leader, progressive thinker, and innovator in the privacy sector who directs complex Global Privacy Programmed. Considered by his peers and clients to be one of the UK's preeminent privacy experts, he has the credibility and gravitas to engender confidence. He is a sought-after commentator contributing to the BBC, ITV News Euronews, Talk Radio, The Independent, and The Guardian, amongst others. His Privacy Pros Podcast reaches audiences in 72 countries and is ranked the number one privacy podcast in the world and one of the top 3 GDPR podcasts. Jamal strives to be a great leader, listener, and coach. He has grown a talented, high-performing team who protects the privacy of 1 billion + data subjects and are international expert in data privacy, GDPR, and cybersecurity. Jamal and his team are driven by the principles of simplifying and demystifying privacy, removing complexities, and educating clients to forge a privacy-by-design culture that enables clients to build their internal privacy capability and capacity. He works with global clients across multiple sectors and jurisdictions, partnering with Boards and C-Suite teams; he debates constructively, challenges rigorously, questions intelligently, and advises pragmatically. Alongside exceptional experience and qualifications, he adds value by providing pertinent insights, bringing alternative perspectives, and triggering healthy debate. ABOUT THE HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organizational culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentoring and coaching privacy professionals. Punit is the author of books “Be Ready for GDPR” which was rated as the best GDPR Book, “AI & Privacy – How to Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured among the top GDPR and privacy podcasts. As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's values to have joy in life. He has developed the philosophy named ‘ABC for the joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe. RESOURCES Websites www.fit4privacy.com , www.punitbhatia.com Podcast https://www.fit4privacy.com/podcast Blog https://www.fit4privacy.com/blog YouTube http://youtube.com/fit4privacy --- Send in a voice message: https://podcasters.spotify.com/pod/show/fit4privacy/message
How To Find A Job With Jamal Ahmed and Punit Bhatia in The FIT4Privacy Podcast E085 S4 (Trailer) Finding a job can be challenging. But with help from a coach like Jamal or Punit, it can be made simpler. Take a listen how. ABOUT THE GUEST Jamal is an astute and influential Privacy Consultant, strategist, Board advisor, and Fellow of Information Privacy. He is a charismatic leader, progressive thinker and innovator in the privacy sector who directs complex Global Privacy Programmed. Considered by his peers and clients to be one of the UK's preeminent privacy experts, he has the credibility and gravitas to engender confidence. He is a sought-after commentator contributing to the BBC, ITV News Euronews, Talk Radio, The Independent, and The Guardian, amongst others. His Privacy Pros Podcast reaches audiences in 72 countries and is ranked the number one privacy podcast in the world and one of the top 3 GDPR podcasts. Jamal strives to be a great leader, listener, and coach. He has grown a talented, high performing team who protects the privacy of 1 billion + data subjects and are international experts in data privacy, GDPR, and cybersecurity. Jamal and his team are driven by the principles of simplifying and demystifying privacy, removing complexities and educating clients to forge a privacy by design culture that enables clients to build their internal privacy capability and capacity. He works with global clients across multiple sectors and jurisdictions, partnering with Boards and C-Suite teams; he debates constructively, challenges rigorously, questions intelligently and advises pragmatically. Alongside exceptional experience and qualifications, he adds value by providing pertinent insights, bringing alternative perspectives and triggering healthy debate. ABOUT THE HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organization culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentoring and coaching privacy professionals. Punit is the author of books “Be Ready for GDPR” which was rated as the best GDPR Book, “AI & Privacy – How to Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured amongst top GDPR and privacy podcasts. As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's value to have joy in life. He has developed the philosophy named ‘ABC for joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe. RESOURCES Websites www.fit4privacy.com , www.punitbhatia.com Podcast https://www.fit4privacy.com/podcast Blog https://www.fit4privacy.com/blog YouTube http://youtube.com/fit4privacy --- Send in a voice message: https://podcasters.spotify.com/pod/show/fit4privacy/message
We're taking a short break here at Stupid Sexy Privacy. We'll return Thursday, May 4th, with our final four episodes. But we didn't want to leave you empty-handed. Today, Amanda King (co-author of "How to Protect Your From Fascists & Weirdos") talks with Professor Uri Gal. Uri is a professor of Business Information Systems at The University of Sydney.In this bonus episode, Amanda talks with Professor Gal about the real challenges and ethical issues surrounding the use of Generative AI (or as we call them, Exploitative AI) software.It's not your job you need to worry about. Generative AI produces C-level work, at best, and almost all of that work is stolen/plagiarized from other people's work without their permission or consent. The real threat is what happens when you flood the entire Internet with BS, to the point where people can't tell up from down anymore and don't trust each other.That's an Avengers-level problem, and one we need to solve immediately since ... You know, the Avengers aren't real. But the threat of Generative AI is.Support Stupid Sexy Privacy: Visit Our Sponsor: DuckDuckGo *Affiliate Link: 1Password.com *Affiliate Link: Delete Me *Affiliate Link: Marshall Rosenberg's book, Non-Violent Communication Get Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal here. BJ's First Privacy Book: Audible** We recommend listening to our friends at Smashing Security for more news and tips concerning how to maintain your privacy and security after this miniseries concludes. *You don't need to use the affiliate links above. They don't cost you anything extra. But. If you do use these links, it'll kick a couple of dollars our way to help support this project.**BJ's first book on privacy, "The End of Privacy" is badly dated in a few sections; however, it's still very funny and the rest of the book is still (sadly) current. We've included most of the book, for free, in this podcast miniseries. If you'd like to buy the unabridged version, you can do so here.Reserve Your Seat For Our Privacy CourseBJ Mendelson and Amanda King are the authors of the upcoming book, "How to Protect Yourself From Fascists and Weirdos." They are designing an online video-based course around the topics discussed in the book and on this show. So, if you want more information on how to protect yourself from fascists and weirdos, complete with step-by-step details and tutorials, we recommend reserving a seat for the course.All you need to do is email us at BJMendelson@Duck.com with "Privacy Course" in the subject line.We'll make sure to let you know when this on-demand course becomes available for purchase.Photo by Kindel Media: https://www.pexels.com/photo/white-and-blue-robot-toy-on-blue-string-lights-8566467/
It's Part 2 of our 5 Part look into how to protect yourself from Fascists and Weirdos on the Internet! Rosie shares three critical tips we won't be able to cover in greater detail in the time we have left. These tips include: How to set up a personal firewall for your network, Pig Butchering Scms, and Revenge Porn.BJ then interviews Tall Poppy CEO Leigh Honeywell. Leigh was a tremendous wealth of knowledge and tips. So make sure you listen to what she has to say. This Week's Privacy Tips1. Get a pfSense Firewall installed. Follow these directions.If you're just getting started with firewalls, we found this video was very good for beginners.2. Watch out for Pig Butchering Scams. Long story short - Strangers will find all sorts of crazy ways to strike up a conversation with you, and then ask you to invest in crypto. DON'T FALL FOR IT. Don't return unsolicited messages, and never invest in crypto ... Unless you talk to someone who is very knowledgeable in the space first. Like, a real expert. Not the pretend ones on Twitter.3. Familiarize yourself with Revenge Porn Laws in your State.*Note: We refer to it in this episode as "Revenge Porn", since that's how it's listed on Carrie's website. However, you should know this is better referred to as "non-consensual intimate images" as well.These are resources we highly recommend for women and others who are being harassed on the Internet: 1. https://onlineviolenceresponsehub.org/resources 2. https://glitchcharity.co.uk/ 3. http://www.crashoverridenetwork.com/4. https://www.wilsoncenter.org/publication/malign-creativity-how-gender-sex-and-lies-are-weaponized-against-women-online(Source: "How to be a Woman on the Internet" written by our show's upcoming guest, Nina Jankowicz.)Our Guest Is ...Leigh Honeywell is the CEO of Tall Poppy and a former Tech Fellow at the American Civil Liberties Union. Previously, Leigh was a Security Program Manager at Microsoft.Support Stupid Sexy Privacy: Visit Our Sponsor: DuckDuckGo *Affiliate Link: 1Password.com *Affiliate Link: Delete Me *Affiliate Link: Marshall Rosenberg's book, Non-Violent Communication Get Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal here. BJ's First Privacy Book: Audible** We recommend listening to our friends at Smashing Security for more news and tips concerning how to maintain your privacy and security after this miniseries concludes. *You don't need to use the affiliate links above. They don't cost you anything extra. But. If you do use these links, it'll kick a couple of dollars our way to help support this project.**BJ's first book on privacy, "The End of Privacy" is badly dated in a few sections; however, it's still very funny and the rest of the book is still (sadly) current. We've included most of the book, for free, in this podcast miniseries. If you'd like to buy the unabridged version, you can do so here.Reserve Your Seat For Our Privacy CourseBJ Mendelson and Amanda King are the authors of the upcoming book, "How to Protect Yourself From Fascists and Weirdos." They are designing an online video-based course around the topics discussed in the book and on this show. So, if you want more information on how to protect yourself from fascists and weirdos, complete with step-by-step details and tutorials, we recommend reserving a seat for the course.All you need to do is email us at BJMendelson@Duck.com with "Privacy Course" in the subject line.We'll make sure to let you know when this on-demand course becomes available for purchase.
We're almost at the end of this mini-series! In our final segment, BJ and Rosie explore how to protect yourself from fascists and weirdos. In Part one of our five-part investigation, Rosie offers tips on how you can protect yourself from stalkers. It's a serious topic, so we're going to skip the jokes and get right to the advice:This Week's Privacy TipThere are A LOT of tips this week, so we're just going to go with a list if you don't mind:1. Do not respond to stalkers. No matter how much they threaten or try to manipulate you, cut them off.2. Page Vault is expensive; however, you can use it to create a digital log of all of your stalker's behavior that's admissible in court. So if the situation is serious and you have the funds? Give it a try.3. Get a Do Not Contact Order. If someone is stalking you, this is one of the first legal lines of defense you can use.4. Set up a PO BOX at least two towns over from where you actually live. Use an Amazon Locker to receive all your deliveries.5. Get a stranger-danger phone.6. Use the @ Duck email and these apps.7. Make sure your friends and family block your stalker and do not tag you in their posts.8. If you live in California, take advantage of the Safe at Home program to keep your mailing address unlisted. 9. Remove all EXIF data from your photos if you're going to upload any. (If not, set your social media accounts to private.)10. If you own any domain names, make sure you are using Private Registry to keep your information offline.11. Learn your IP address. Go to Google and search, "What is my ip address?". Then look at all of the places you log into and see if that's the only IP address that appears. If not, immediately change your passwords. 12. Experien13. Report all instances of online stalking to the FBI. Do not take any stalking lightly. If you are worried, file a report.14. Call Experian, Equifax, and Transunion to request a Fraud Alert on your credit Reports: Experian (888) 397-3742 Equifax (888) 766-0008 TransUnion (877) 322-8228 15. See below!Our Guest Is ... Dr. Nicole Prause is a neuroscientist and statistician at UCLA. She has previously researched the myths and lies of the anti-porn movement and is the founder of Liberos, an organization that looks to identify the general health benefits of sexual stimulation.Dr. Nicole has a terrific suggestion to share as well. If you don't know who is stalking and harassing you, you can take them to small claims court. Doing so will reveal the identity of the stalker.Support Stupid Sexy Privacy: Visit Our Sponsor: DuckDuckGo *Affiliate Link: 1Password.com *Affiliate Link: Delete Me *Affiliate Link: Marshall Rosenberg's book, Non-Violent Communication Get Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal here. BJ's First Privacy Book: Audible** We recommend listening to our friends at Smashing Security for more news and tips concerning how to maintain your privacy and security after this miniseries concludes. *You don't need to use the affiliate links above. They don't cost you anything extra. But. If you do use these links, it'll kick a couple of dollars our way to help support this project.**BJ's first book on privacy, "The End of Privacy" is badly dated in a few sections; however, it's still very funny and the rest of the book is still (sadly) current. We've included most of the book, for free, in this podcast miniseries. If you'd like to buy the unabridged version, you can do so here.Reserve Your Seat For Our Privacy CourseBJ Mendelson and Amanda King are the authors of the upcoming book, "How to Protect Yourself From Fascists and Weirdos." They are designing an online video-based course around the topics discussed in the book and on this show. So, if you want more information on how to protect yourself from fascists and weirdos, complete with step-by-step details and tutorials, we recommend reserving a seat for the course.All you need to do is email us at BJMendelson@Duck.com with "Privacy Course" in the subject line.We'll make sure to let you know when this on-demand course becomes available for purchase.P.S. These are the kind of weirdos we're talking about.(Photo by Antonio Florentini)
This week on Stupid Sexy Privacy: Killer Bosses. 120,000 workers die each year in the United States because of bad workplace management. With the popularity of Remote Work, "Bossware" lets your boss spy on you while you're at home and drive you crazy without you having to go to the office.Sound crazy? Talk to the Truck Drivers. Their Hell is our Future. If you work remotely, this episode is for you.This Week's Privacy TipWorking from home can be a great opportunity, but you need to take steps to protect both yourself and your employer from Ransomware and other shady attacks. In addition to following the steps explained in previous episodes of the show — You've listened to the other episodes, right? — We recommend keeping your hardware for work entirely separated from your hardware for life, running a VPN, and regularly running software updates. As far as the bigger issue goes with your boss spying on you at home, the United States doesn't have clear regulations (at this time) to stop them. But. You CAN (and should) talk to your Human Resources Director about what the company policy is about Remote Work, what data they're going to see and collect, and who that data gets shared with.Do you really trust Microsoft to be a good protector of your data? '90s Kids know better.Our Guest Is ... Dr. Karen Levy, associate professor in the Department of Information Science at Cornell University and author of the new book, "Data Driven: Truckers, Technology, and the New Workplace Surveillance."*Support Stupid Sexy Privacy: Visit Our Sponsor: DuckDuckGo *Affiliate Link: 1Password.com *Affiliate Link: Delete Me *Affiliate Link: Marshall Rosenberg's book, Non-Violent Communication Get Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal here. BJ's First Privacy Book: Audible** We recommend listening to our friends at Smashing Security for more news and tips concerning how to maintain your privacy and security after this miniseries concludes. *You don't need to use the affiliate links above. They don't cost you anything extra. But. If you do use these links, it'll kick a couple of dollars our way to help support this project.**BJ's first book on privacy, "The End of Privacy" is badly dated in a few sections; however, it's still very funny and the rest of the book is still (sadly) current. We've included most of the book, for free, in this podcast miniseries. If you'd like to buy the unabridged version, you can do so here.Reserve Your Seat For Our Privacy CourseBJ Mendelson and Amanda King are the authors of the upcoming book, "How to Protect Yourself From Fascists and Weirdos." They are designing an online video-based course around the topics discussed in the book and on this show. So, if you want more information on how to protect yourself from fascists and weirdos, complete with step-by-step details and tutorials, we recommend reserving a seat for the course.All you need to do is email us at BJMendelson@Duck.com with "Privacy Course" in the subject line.We'll make sure to let you know when this on-demand course becomes available for purchase.P.S. '90s kids also had to call collect on a payphone in order to get picked up from school. What a scam.Photo Courtesy of Andrea Piacquadio
This week, BJ's co-author, Amanda King, speaks with Jen Caltrider, the Mozilla Foundation's "Privacy Not Included" project lead. Amanda and Jen discuss which pregnancy tracker is best for women to use right now when it comes to preserving and protecting their data. They also talk about other issues facing women as it relates to online data collection in our new, creepy, post-Roe world.This Week's Privacy TipIt's a short one this week, but an important one. Ensure you've deactivated biometric and facial recognition methods for unlocking your phone. We've covered that one already. But now, there's a trend where thieves are using a variety of ways to spy on their victims in an effort to observe their passcode. So, make sure you're using a long, alphanumeric passcode — write it down in your Privacy Notebook! — And make sure to obscure your screen whenever you need to unlock your phone. Only you should be able to see what you're doing.Also: We know most of you are not storing your photos in the cloud if you're listening to this show, but if you still have backups of your photos going to the cloud, make sure to delete any photos containing financial information. And if you're going to go out for a while, it doesn't hurt to remove any apps that provide access to that information in the event your phone is stolen. You can always re-download those apps when you get home.Support Stupid Sexy Privacy: Visit Our Sponsor: DuckDuckGo *Affiliate Link: 1Password.com *Affiliate Link: Delete Me *Affiliate Link: Marshall Rosenberg's book, Non-Violent Communication Get Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal here. BJ's First Privacy Book: Audible** We recommend listening to our friends at Smashing Security for more news and tips concerning how to maintain your privacy and security after this miniseries concludes. *You don't need to use the affiliate links above. They don't cost you anything extra. But. If you do use these links, it'll kick a couple of dollars our way to help support this project.**BJ's first book on privacy, "The End of Privacy" is badly dated in a few sections; however, it's still very funny and the rest of the book is still (sadly) current. We've included most of the book, for free, in this podcast miniseries. If you'd like to buy the unabridged version, you can do so here.Reserve Your Seat For Our Privacy CourseBJ Mendelson and Amanda King are the authors of the upcoming book, "How to Protect Yourself From Fascists and Weirdos." They are designing an online video-based course around the topics discussed in the book and on this show. So, if you want more information on how to protect yourself from fascists and weirdos, complete with step-by-step details and tutorials, we recommend reserving a seat for the course.All you need to do is email us at BJMendelson@Duck.com with "Privacy Course" in the subject line.We'll make sure to let you know when this on-demand course becomes available for purchase.P.S. When we were coming up with titles for this episode, we were going to go with a Jimmy Cagney impression. But then we realized everyone who would get that reference is probably dead. :-(Photo Credit: Shvartsman Dmitry
Nothing is as polarizing for Ergonomics Consultants as whether or not our services qualify under Health Information Protection Law. On this episode, Joe Lindsay joins us today to chat about health information, whether ergonomics applies to health information, and then what you can do as a professional to protect yourself and your clients with clear thoughtful steps. Links:Get started with office ergonomics assessments, Free Training!: https://www.ergonomicshelp.com/beginWaitlist for Accelerate: The Business of Ergonomics (next enrollment is March 2023) https://www.ergonomicshelp.com/biz
This week, we're entering the metaverse. A place where few have legs and fewer still have functional head-mounted displays.Joining BJ on the show today is Brittan Heller. Brittan is a Senior Fellow at the Atlantic Council and Affiliate at Stanford Cyber Policy Center.Following-up on last week's discussion with Dr. Arthur Caplan, BJ and Brittan discuss how easy it is to identify someone just from their head movements, why that information isn't currently protected, and how to design a metaverse that's accessible and equitable to all.Rosie will also share with you this week's privacy tip, which this week is less of a tip and more of a book recommendation. As it turns out, with the coming explosion of Augmented Reality Glasses thanks to Apple later this year, we all need to take some time and learn non-violent communication. Rosie will explain why!This episode may seem future-facing, but the truth is, this is a privacy and security challenge we all face today. If data collected from a head-mounted display like the Meta Quest 2 can diagnose you with ADHD, you probably want to have that kind of information private.And if it's true your head movements are specific and unique to you, that kind of information is the stuff marketers and advertisers would kill to collect. Which ... is why we did this episode. These are conversations we need to have now, and as Brittan points out, our government is woefully unprepared to do so. Resources Mentioned In Today's Show:Support your local bookstore and purchase a copy of Marshall Rosenberg's "Non-Violent Communication."*Our Sponsor: DuckDuckGo*Affiliate Link: 1Password.com*Affiliate Link: Delete MeGet Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal here.*Using the affiliate links, like the one for Bookshop.org above, supports the show and does not cost you anything extra. If you enjoy the show, we encourage you to use these links.And before we go ...BJ and Amanda are recording a two-hour video course that you can purchase based on this podcast and their upcoming book, "How to Protect Yourself From Fascists and Weirdos."The course will include every step from our privacy audits and examples of how to put those steps into practice.If you'd like to know when the course is available, email BJ at BJMendelson@Duck.com with Privacy Course in the subject line.
This week Amit and Max break down the recent updates to the Biometric Information Privacy Act (BIPA).
Over the next three episodes (17, 18, and 19), we'll let our medical and privacy experts take center stage, so all of the tips in these three episodes will be super short.This week, BJ (with Rosie's assistance) interviewed Dr. Arthur Caplan, a professor of bioethics at New York University. Dr. Caplan is also the founding head of the Division of Medical Ethics at NYU Grossman School of Medicine.BJ's audio got jacked up, so Rosie re-recorded BJ's questions. Wasn't that nice of her?This discussion with Dr. Caplan is super important to listen to. That's because it sets the stage for our following interview with Brittan Heller, Senior Fellow of Democracy and Technology at The Atlantic Council, and Jen Caltrider from the Mozilla Foundation's Privacy Not Included initiative. All three of these interviews build off each other.Dr. Caplan explains how HIPPA is useless and doesn't protect you at all from the misuse of your health data by Big Tech.Brittan and BJ talk about how head-mounted displays used in AR and VR devices can be used to tell if you have Autism (as one example).And Jen talks to BJ's co-author, Amanda King, about the current state of pregnancy trackers, the device they collect, and who that information is being shared with.So, pretty important stuff. We hope you give these three episodes a listen. And don't worry. Rosie and BJ will be back with more tips and jokes in Episode 20! Resources Mentioned In Today's Show:-Set up a Google Alert for your name and any prominent usernames you use here.-If you are being stalked and harassed online, Hunchly can help you collect evidence of the harassment. You can use the information gathered by Hunchly to create an Incident Tracking Chart, which will help you and your attorneys strike back at harassers.-Page Vault is a more advanced program that offers similar features to Hunchly, but with one key difference: Information saved into Page Vault is admissible in a court of law. The downside? Page Vault is REALLY expensive.Our Sponsor: DuckDuckGo*Affiliate Link: 1Password.com*Affiliate Link: Delete MeGet Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal here.*Using the affiliate links supports the show and does not cost you anything extra. If you enjoy the show, we encourage you to use these links.And before we go ...BJ and Amanda are recording a two-hour video course that you can purchase based on this podcast and their upcoming book, "How to Protect Yourself From Fascists and Weirdos."The course will include every step from our privacy audits and examples of how to put those steps into practice.If you'd like to know when the course is available, email BJ at BJMendelson@Duck.com with Privacy Course in the subject line.
You ever have a doctor take photos of your condition for further examination? How about an MRI? Have you had one of those? We like to think that HIPPA (Health Insurance Portability and Accountability Act) protects us here in the US. But increasingly ... It doesn't.So over the next few weeks, we'll talk about who's collecting your medical information, how they're using it, and who they're sharing it with. And this series is wild because we're not only talking about pictures of that funny-looking mole you have. We're talking about the neural patterns of your brain and how it acts as you make decisions in Virtual Reality.First things first, though: This week, we're going to look at services like MyChart, Phreesia, and the MANY doctor's offices that utilize Facebook's Tracking Pixel on their website. We'll tell you how to stop these companies from collecting and sharing your data, and then we'll explain why you want to do that. I mean, unless you want a generative AI like Chat GPT3 to be looking at photos of your favorite private parts and drawing some really interesting conclusions to share with others. (A real thing that's already happened.)Also, In Today's Episode ...BJ Speaks with Matthew D Green at John Hopkins University Information Security Institute to follow up on our previous episode concerning "The Cloud" and why you shouldn't put your important stuff in there.Resources Mentioned In Today's Show-Email Privacy@Phreesia.com to opt out of their data collection -Call your doctor's office to see what data is being shared and collected on you by companies like My Chart and request to opt out.-Use the Tor Browser when visiting any websites related to managing your health care.-Use PimEyes to see who is using pictures of your face.-Use the pictures found by PimEyes to search HaveIBeenTrained.com to make sure your photos aren't being used to train generative AIs like ChatGPT3 -Request Clearview AI remove any pictures they have on you here.-BJMendelson.com's Data Opt-Out Request ListOur Sponsor: DuckDuckGo*Affiliate Link: 1Password.com *Affiliate Link: Delete MeGet Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal here.*Using these affiliate links helps to support the show and do not cost you anything extra to use. If you like the show, we encourage you to use these links to sign-up for must have services like 1Password and Delete Me.And before we go ...Thanks to the interview in Slate, we're overwhelmed with requests for Privacy Audits.So!We want to let you know BJ and Amanda are recording a two-hour video course that you can purchase.The course will include every step from the privacy audit and examples of how to put those steps into practice.If you'd like to know when the course is available, email BJ at BJMendelson@Duck.com with Privacy Course in the subject line.
The "Cloud" has a bigger carbon footprint than the entire airline industry. It's also not secure. So if someone wants to mess with you, or worse, blackmail you after accessing your iCloud, GDrive, or Dropbox data? They absolutely can. Instead, we want you to go old school. So this week, Rosie explains why you want to get a nice external hard drive, encrypt a folder or the entire drive, and save your stuff there.Resources Mentioned In Today's Show-Veracrypt (Wired's article on how to use it)-Toshiba Canvio Flex External HD (Portable)-Seagate Backup Plus Hub External HD (NOT portable. This drive needs to be plugged in.)-Tresorit-ProtonDrive (comes with a ProtonMail account, which we recommended here in a previous episode.)TP Link AX3000 Router-Additional Steps on how to secure your router.Also In This Episode ...This episode also contains the last part of BJ's first book on privacy — written back in 2017 — as read by Broadway actor Roger Wayne. After this week, every remaining episode will include an interview with a privacy and security expert! Our Sponsor: DuckDuckGoAffiliate Link: 1Password.com Get Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal here.And before we go ...Thanks to the interview in Slate, we're overwhelmed with requests for Privacy Audits. So! We want to let you know BJ and Amanda are recording a two-hour video course that you can purchase. The course will include every step from the privacy audit and examples of how to put those steps into practice. If you'd like to know when the course is available, email BJ at BJMendelson@Duck.com with Privacy Course in the subject line.Photo Credit: Karolina Grabowska
This week, the women of our show kick BJ to the curb and go deep on tips, tricks, and apps you can use to keep safe while going out on a date.There's A LOT covered in this episode, but some of the highlights of what's covered by Rosie and Amanda King (co-author of "How to Protect Yourself From Fascists and Weirdos) include: How to avoid getting blackmailed, why you should use all new photos for your dating profile and remove the EXIF data from them, what tools you should know like Garbo.io and Noonlight, and why you should break up with someone at a Walmart. (A Mendelson Family tradition.)Resources Mentioned In Today's ShowRemove EXIF information from your photos here.California Consumer Privacy Act (Now in effect!)Virginia Consumer Data Protection Act
Are You Ready To Build A Thriving Career In Privacy?Our guest today is none other than Joanna Kennedy, an accomplished Data Protection Officer who has a wealth of experience in navigating the complex landscape of data protection. Joanna shares her inspiring story of how she made a successful pivot from marketing to privacy and how she continues to invest in her professional development to stay ahead of the game. She also gives us a sneak peek into the inner workings of an IAPP exam question writer, providing valuable insights for anyone looking to pursue a career in data privacy. Hi, my name is Jamal Ahmed and I'd like to invite you to listen to this special episode of the #1 ranked Data Privacy podcast.In this episode, discover:The certifications that matter to excel in privacyValuable strategies for gaining buy-in for privacy programs from key stakeholdersHow to measure the success of your privacy programs and understand the metrics that matterHow you can succeed in privacy even if you don't have a legal background Get ready to learn from one of the industry's top experts on data protection!Joanna Kennedy is the Global Group Data Protection Officer at the Performance Review Institute. Joanna has overall global responsibility for data protection activities within the SAE Group, adopting a pragmatic, risk-based approach that focuses on the business benefits of compliance. She has been appointed a Fellow of Information Privacy by the International Association of Privacy Professionals and is a qualified Data Protection Practitioner (PC.dp GDPR). She is also a Certified Information Privacy Manager (CIPM) and a Certified Information Privacy Professional – Europe (CIPP/E). Joanna has been recognized as a OneTrust Privacy Professional and a OneTrust Governance, Risk and Compliance Professional. She is an IAPP exam question writer and a OneTrust Insights author. She has also volunteered as a school governor, responsible for their data privacy policy.Follow Jamal on LinkedIn: https://www.linkedin.com/in/kmjahmed/Follow Joanna on LinkedIn: https://www.linkedin.com/in/joanna-kennedy-4a797613/Take your career to the next level with The Privacy Pros Ultimate CIPPE Certification Programme: http://bit.ly/3ZmiJZzGet Exclusive Insights, Secret Expert Tips & Actionable Resources For A Thriving Privacy Career That We Only Share With Email Subscribers► https://newsletter.privacypros.academy/sign-upSubscribe to the Privacy Pros Academy YouTube Channel► https://www.youtube.com/c/PrivacyProsJoin the Privacy Pros Academy Private Facebook Group for:Free LIVE TrainingFree Easy Peasy Data Privacy GuidesData Protection Updates and so much moreApply to join here whilst it's still free: https://www.facebook.com/groups/privacypro
This week we introduce the Stranger Danger Phone! This is a backup, pre-paid Smartphone we recommend you use when dating online. The Stranger Danger Phone is also great for content creators who maintain some kind of public-facing presence online and need to be accessible to their audience.These are easy to set up, and not expensive. Never give out your real phone number again! Rosie will explain why, and give you the steps you need to take to get one set up.Also featured in today's episode, BJ speaks with the author of "How to Disappear," Frank M Ahearn. Today, Frank helps the thousands of people who fall victim to blackmail, extortion, sextortion, and romance scams online. We talk about what steps you can take to better protect yourself, and why you should consider riding the bus the next time you want to make a break for it.***Resources Mentioned In Today's ShowGoogle Voice
Why do individuals, organizations, institutions, nations, or responsible agents work hard to preserve their personal and enterprise data, personnel information, trade secrets, intellectual properties, technical know-how, or national data, yet easily trade on the individual and enterprise data and national data of others? To understand and answer the question appropriately, one must examine the underlying of the Information Privacy Realities Contradiction Theory (IPRCT), which is integral to (1) our natural unity of opposites, (2) our material dialectic mechanism or struggle of choosing from the opposites, and (3) the role of our self-interest in time and circumstance. Therefore, understanding the intricacies of the IPRCT would be instrumental to the proper and timely introduction of privacy requirements early in our system development lifecycle and in the development and enactment of information privacy policies, directives, guidance, and regulations around the world. In this ISACA Podcast episode, Safia Kazi host Dr. Patrick Offor, Chief Warrant Officer Five Retired (CW5(R)); Associate Faculty, to discuss his recently released ISACA Journal article. To read Dr. Offor's full article, please visit https://www.isaca.org/resources/isaca-journal/issues/2022/volume-6/the-information-privacy-contradiction. To listen to more ISACA podcasts, please visit www.isaca.org/podcasts.
You need Proton Mail. Get on that immediately.Unless you use Gmail and you followed our previous advice about pairing your Gmail account with a Yubikey. In which case, you can do nothing.Unless ...This week, Rosie is going to show you how to send an encrypted email, using Proton Mail's free plan, to anyone who doesn't have an encrypted email account.This is especially useful if you ever need to send financial or health information to someone, and you can't get them to ride the Signal Bus.We're also going to explain in this episode why you should keep your most important email contacts stored offline, the way BJ's Boomer Dad does.For once, when it comes to technology, BJ's Dad is doing the right thing, and you should too. And later, Roger returns to talk about some recent data breaches, including North Korea's hacking of SONY, which is way crazier than you think it is.Resources Mentioned In Today's ShowProton Mail and Proton VPN Recent example of a rogue employee causing a security breach.Another example of a serious hack caused by an employee's computer getting infected with malware.***Our Sponsor: DuckDuckGoAffiliate Link: 1Password.com Get Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal here.And before we go ...We're overwhelmed with requests for Privacy Audits thanks to the interview in Slate. So! We'd like to let you know BJ is recording a two-hour course that you can purchase. The course will include every step from the privacy audit and include examples of how to put those steps into practice.If you'd like to know when the course is available for purchase, email BJ at BJMendelson@Duck.com
We're big fans of Tina Turner; what can we say? This week, we're talking about how to secure your email account. First, by using a hardware authentication device like a Yubikey (or Google's Titan Key if you prefer.) We also talk about utilizing Google's Advance Threat Protection Program for Gmail users who want additional security.A pretty straightforward episode this week, but no less an important one, so don't miss it!Resources Mentioned In Today's ShowYubikey (For Apple customers, read this: "Security Keys are the Best Way to Protect Your Apple ID")Google's Advance Threat Protection Program***Our Sponsor: DuckDuckGoAffiliate Link: 1Password.com Get Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal hereBook Your Privacy Audit with BJ: Email BJMendelson@Duck.comIn this confidential, one on one call (conducted through Signal), BJ will walk you through all 23 steps that you should follow to better protect yourself from fascists and weirdos on the Internet. Then, a week later, he will follow up to answer any questions you might have and troubleshoot if/as needed.Episode photo provided by Ekaterina Belinskaya.
It's time for the second part of our two-part Digital Detox spiel. Rosie returns with a simple exercise you can do every time you find yourself holding your smartphone, and explains why you need to make your bedroom a phone free bone zone.Bonus: BJ interviews werables reviewer at The Verge, Victoria Song, to talk about privacy and ghosts. (Look, it can't all be serious privacy stuff all the time, you know?)Photo by Mahrael Boutros: https://www.pexels.com/photo/photo-of-two-women-1215709/
Episode SummaryIt's Part 1 of our two-part Digital Detox! In this week's episode, we give you a two-step exercise to help you get rid of unused apps and think critically about how you use the ones you keep.Once a month, make sure you grab some time to remove any of the unused apps on your phone. Each one represents a potential opportunity for fascists or weirdos to access your information and maybe even your microphone.Here are some excellent tips from The Washington Post on how to greyscale your phone and use the Digital Wellness features to place timers on the apps you decide to keep.All this, and Roger returns to explain a vicious cycle between tech companies who "borrow" your data, and the media that covers their borrowing. Plus! Kelly Carlin joins us to talk about her recommendations for living mindfully and managing the digital clutter that's attempting to consume our lives.Resources Mentioned In Today's ShowA good explainer on the Joffe v. Google case***Our Sponsor: DuckDuckGoAffiliate Link: 1Password.com Get Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal hereBook Your Privacy Audit with BJ: Email BJMendelson@Duck.comIn this confidential, one on one call (conducted through Signal), BJ will walk you through all 23 steps that you should follow to better protect yourself from fascists and weirdos on the Internet. Then, a week later, he will follow up to answer any questions you might have and troubleshoot if/as needed.Photo by Joe deSousa on Unsplash
Episode SummaryThis week is super simple. There are four programs everyone should have. 3 of which you can use on both your laptop and phone, and one that's desktop only (ClamAV).So, when you're done listening to today's episode, you're going to want to download and use these.Pro-Tip: Always activate your VPN if you're out and about. You can't trust every public Wi-FI spot that's out there. And while many are legit, it's just as easy to activate your VPN before connecting to any of them on your phone.Resources Mentioned In Today's ShowSignal
Episode SummaryBreaking up is hard to do. Sure. But when you're leaving a relationship where you shared a device with your partner, it might be time to get a new device. And we mean like NEW. Not refurbished. It's expensive, but there's a good reason to take this step, as Rosie explains.You will also hear more from BJ's first book on privacy, narrated by Broadway actor Roger Wayne. In this week's excerpt, Roger talks about the perils of the Internet of Things.*Just a note: After recording this episode, Apple announced they were going to improve the security of iCloud. We need to evaluate this further, but for now, we still recommend avoiding it for now.Resources Mentioned In Today's ShowiMazingHidden Camera Detector***Our Sponsor: DuckDuckGoAffiliate Link: 1Password.com Get Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal hereBook Your Privacy Audit with BJ: Email BJMendelson@Duck.comIn this confidential, one on one call (conducted through Signal), BJ will walk you through all 23 steps that you should file to better protect yourself from fascists and weirdos on the Internet. Then, a week later, he will follow-up to answer any questions you might have and troubleshoot if/as needed.
Episode SummaryIn today's episode of Stupid Sexy Privacy, comedian and WAYWO.TV Reporter, Rosie Tran, talks about how to keep your data, and yourself, safe when traveling internationally. It involves using old stuff, and we'll also explain why you'll want to turn off facial recognition on your phone before crossing any borders.You will also hear more from BJ's first book on privacy, as narrated by Broadway actor, Roger Wayne. In this episode Roger explains why your data is so valuable in the first place. You'll never guess what the answer is. Or maybe you have, but you'll enjoy hearing Roger tell you about it just the same.Resources Mentioned In Today's ShowOur Sponsor: DuckDuckGoAffiliate Link: 1Password.com Get Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal hereBook Your Privacy Audit with BJ: Email BJMendelson@Duck.comIn this confidential, one on one call (conducted through Signal), BJ will walk you through all 23 steps that you should file to better protect yourself from fascists and weirdos on the Internet. Then, a week later, he will follow-up to answer any questions you might have and troubleshoot if/as needed.
Episode SummaryIn today's episode of Stupid Sexy Privacy, comedian and WAYWO.TV Reporter, Rosie Tran, talks about how to keep our data (and ourselves) safe while traveling domestically here in the United States. It involves a USB Condom and a hidden camera detector. Also this week: Author B.J. Mendelson speaks with Twitch's Chief Product Officer, Tom Verrilli, about the future of live streaming, what steps streamers can take to better protect themselves, and what the platform is doing to help. So if you have any interest in getting on Twitch or just live streaming your hijinks, this episode is for you.Resources Mentioned In Today's Show-Hidden Camera Detector-USB Condom-Proton VPNOur Sponsor: DuckDuckGoAffiliate Link: 1Password.com Get Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal hereCover Your Internet-Connected Cameras: Use Silent Pocket's Web Cam and Smartphone StickersBook Your Privacy Audit: Email BJMendelson@Duck.comPrivacy Audits are two, one-hour consultations with B.J. Mendelson that are done via Signal. The first consultation walks you through each of the 23 Privacy Tips (and some bonus ones depending on your device). The second consultation occurs one week later to make any adjustments and answer any additional questions.
Episode SummaryIn today's episode of Stupid Sexy Privacy, comedian and WAYWO.TV Reporter, Rosie Tran, talks about how much data your car is collecting on you. The bad news is, in the US, legislation to limit the collection and sale of this data to data brokers from car manufacturers is non-existent. There are still things you can do to protect yourself, like getting a cheap auxiliary cable and using that to connect to your car's entertainment system. Rosie explains. All this and more from BJ's first book on Privacy, as read by Broadway Actor, Roger Wayne. Resources Mentioned In Today's ShowMic-Lock sells microphone blockers that you can purchase here.Our Sponsor: DuckDuckGoAffiliate Link: 1Password.com Get Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal hereCover Your Internet-Connected Cameras: Use Silent Pocket's Web Cam and Smartphone StickersBook Your Privacy Audit: Email BJMendelson@Duck.comPrivacy Audits are two, one-hour consultations with B.J. Mendelson that are done via Signal. The first consultation walks you through each of the 23 Privacy Tips (and some bonus ones depending on your device). The second consultation occurs one week later to make any adjustments and answer any additional questions.
Episode SummaryIn today's episode of Stupid Sexy Privacy, comedian Rosie Tran talks about how your SmartTVs spy on you through a technology called Automatic Content Recognition. We'll tell you how to turn off ACR (hint, look at the links below), and we'll also cover Silent Pocket's privacy stickers. Leave no internet connected camera uncovered!All this and more from BJ's first book on Privacy, as read by Broadway Actor, Roger Wayne. Resources Mentioned In Today's ShowHere's how to turn off ACR in your SmartTVSilent Pocket Web camera and Smartphone privacy stickers.Our Sponsor: DuckDuckGoAffiliate Link: 1Password.com Get Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal hereBook Your Privacy Audit: Email BJMendelson@Duck.com. Privacy Audits are free if you pre-order the “How To Protect Yourself From Fascists & Weirdos” book bundle. Click here to get $100 off your purchase with this exclusive coupon.
Episode SummaryIn today's episode of Stupid Sexy Privacy, a WAYWO.TV Special Report sponsored by DuckDuckGo, Comedian Rosie Tran explains why you should regularly update the software on the devices inside your home (but especially, your router.) Than, Rosie explains how to keep the username and passwords for these household devices by ... You guessed it. Keeping them in your Privacy Notebook.No. It's not your name. It's your Master Password from 1Password. Resources Mentioned In Today's ShowOur Sponsor: DuckDuckGoAffiliate Link: 1Password.com Get Your Privacy Notebook: Get your Leuchtturm1917 Official Bullet Journal hereBook Your Privacy Audit: Email BJMendelson@Duck.com. Privacy Audits are free if you pre-order the “How To Protect Yourself From Fascists & Weirdos” book bundle. Click here to get $100 off your purchase with this exclusive coupon.
Stories in this episode: Day in History: 1947: Baseball game in Nicollet Park uses same baseball entire game Anti-abortion pregnancy centers pose medical information privacy risk How community comments affected – or didn't – the proposed unified development code Mussel, fish surveys around Austin document the health of the Cedar River Watershed Brothers in the spotlight on track championship night at Deer Creek Speedway The Post Bulletin is proud to be a part of the Trust Project. Learn more at thetrustproject.org.
Continuing in her exploration of the intersection of technology and privacy, Marisa and leading health law, bioethics, and medical humanities scholar, Professor Stacey Tovino, dig into patient privacy, the changing landscape of privacy in the U.S., Professor Tovino's “dream” privacy regulations, and why patient privacy matters. Scholars discussed in this episode can be found listed below Stacey Tovino, University of Oklahoma - DeIdentification reidentification (Duke Law Journal) - A Timely Right to Privacy (Iowa Law Journal) Nicholas Terry, Indiana University - Expertise: Privacy and Confidentiality Sharona Hoffman - - Expertise: Privacy and Confidentiality Nicholson Price, University of Michigan - Expertise: Black Box Medicine Charlotte Tschider, Loyola University Chicago School of Law Expertise: - Patient Privacy, Health Information Confidentiality - Consumer Data Protections - Informed Consent & Consent Models in Data Privacy Mark Racine, University of Louisville Schools of Medicine and Law