Podcasts about personally identifiable information pii

  • 39PODCASTS
  • 43EPISODES
  • 27mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Mar 10, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about personally identifiable information pii

Latest podcast episodes about personally identifiable information pii

Telecom Reseller
BroadSource Unveils SecurePII: Revolutionizing Data Security for Service Providers, Podcast

Telecom Reseller

Play Episode Listen Later Mar 10, 2025


Cloud Connections 2025 Preview: BroadSource's SecurePII Takes Center Stage March 2025 – Technology Reseller News – BroadSource has officially launched SecurePII, a cutting-edge real-time redaction platform designed to protect Personally Identifiable Information (PII) in telecommunications networks. In a special Cloud Communications Alliance (CCA) podcast, Haydn Faltyn and Bill Placke from BroadSource joined Doug Green to discuss the technology, its market impact, and why service providers should take notice. The Growing Need for Real-Time PII Protection BroadSource has long been a leader in delivering technology solutions to cloud communications providers. With SecurePII, they are addressing a critical issue in telecommunications: how to protect PII that traverses carrier networks. The demand for real-time data redaction has surged due to increasing regulatory requirements, including CCPA, GDPR, HIPAA, and the evolving PCI DSS 4.0 standard. Faltyn explains: “We launched SecureCall as a PCI-compliant platform for credit card redaction last year. But service providers and enterprises alike need more—protection beyond just payment information. SecurePII extends our technology to safeguard all forms of personal data in voice communications.” Shifting the Compliance Conversation Placke highlights the legal and compliance challenges that enterprises face, as regulators worldwide introduce stricter measures around data privacy. “Legal teams are often forced to say ‘no' to new initiatives because of concerns over PII exposure. SecurePII flips the script—by redacting sensitive data in real time, businesses can fully leverage AI, analytics, and automation without compliance roadblocks.” A Game Changer for AI-Driven Business Communications The rise of AI and large language models (LLMs) has created a data dilemma for enterprises: how can they safely utilize voice data for AI applications, customer analytics, and automation without violating data privacy laws? With SecurePII, BroadSource provides a solution that allows organizations to extract value from their data without storing or processing sensitive customer information. By removing PII in real-time, businesses can: Enhance AI training models without compliance risks Increase customer trust by ensuring privacy protection Reduce operational risks and costs associated with data breaches and regulatory fines Impact on Contact Centers and CX A core use case for SecurePII is contact centers, where credit card details, account numbers, and personal information are frequently exchanged over voice channels. The platform ensures: Seamless transactions without the risk of human agents being exposed to sensitive data A frictionless customer experience that retains the personal touch while safeguarding information Higher revenue retention—BroadSource has observed a 9% increase in revenue when businesses implement SecurePII in customer interactions BroadSource's SecurePII Roadmap and Upcoming Events The launch of SecurePII marks a new strategic direction for BroadSource, emphasizing data security as a core value for service providers. Faltyn and Placke will be presenting SecurePII at: Cavell's Summit Europe 2025 – A premier event for cloud communications leaders Cloud Connections 2025 (CCA Conference, St. Petersburg, FL) – Where BroadSource will showcase SecurePII's capabilities to global service providers Where to Learn More SecurePII is now live, and service providers can integrate it into their networks today. BroadSource has also launched a dedicated website for SecurePII, providing resources, case studies, and implementation details. Visit: www.securepii.cloud BroadSource's mission is clear—to empower service providers with the tools to protect their networks, comply with global regulations, and enable the future of AI-driven business communications. With SecurePII,

Law School
Consumer Protection Law (Part 1 of 2): A Focus on Consumer Privacy

Law School

Play Episode Listen Later Feb 19, 2025 24:29


In today's podcast, we discussed the critical area of consumer protection law, focusing on consumer privacy. Consumer protection law covers a broad range of areas including product safety, false advertising, fair credit reporting, debt collection practices, warranties, consumer contracts, and unfair trade practices. Due to the increasing importance of protecting personal data in the digital age, we concentrated on consumer privacy.Consumer privacy is centered on protecting individuals' personal information from unauthorized collection, use, and disclosure. This information, known as Personally Identifiable Information (PII), includes names, addresses, phone numbers, email addresses, social security numbers, credit card details, browsing history, and location data. Protecting this data is crucial to prevent identity theft, financial fraud, and other harms. Strong privacy measures empower consumers by giving them control over their data and fostering trust between individuals and businesses, which is essential for a healthy digital economy.Protecting consumer privacy is necessary for several reasons: to prevent identity theft and fraud, to safeguard sensitive information from being misused for discriminatory practices, to give consumers rights over their data, and to build trust between consumers and businesses.Key regulatory frameworks that shape consumer privacy law include the European Union's General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). The GDPR emphasizes principles such as data minimization, purpose limitation, and obtaining explicit consent before processing personal data. It also gives individuals rights to access, correct, and erase their data. The CCPA grants California residents the rights to know what data is collected, to request its deletion, and to opt out of its sale. These regulations show a global trend toward stricter controls over how personal data is handled.Despite these regulations, challenges remain, including data breaches, pervasive tracking and surveillance of online activities, targeted advertising practices, complexities of cross-border data transfers, and emerging technologies.Enforcement mechanisms, such as regulatory bodies and judicial remedies, are essential for effective consumer privacy protection.Consumer privacy law will continue to evolve in response to technological advancements and the increasingly global nature of data flows. Enhanced consumer empowerment tools and ongoing regulatory innovation will likely shape future legal developments.

The Cybersecurity Readiness Podcast Series
Authenticate without Storing Credentials: MIT Scientist Cracks the Code

The Cybersecurity Readiness Podcast Series

Play Episode Listen Later Jan 13, 2025 28:58


Despite companies' best efforts, stored access credentials inevitably get stolen or misused. Whether it is a disgruntled employee posting the data, an employee that makes an innocent mistake exposing that data, a company needing revenue selling the information, a criminal hacker group stealing the information, or a government-backed group stealing the information, etc. it is simply a matter of when not if that information will be stolen.“The only truly safe way to handle people's secrets is never to store them in the first place – what is not stored cannot be stolen,” says Tina Srivastava, Ph.D., an MIT-trained rocket scientist and privacy expert who has cracked the code on stored credentials She is the co-founder of Badge, a platform that allows users to enroll and authenticate on any device without storing Personally Identifiable Information (PII). In this episode, Tina and I discuss how the new technology works, its implications, and how organizations should ensure they are not storing user credentials.To access and download the entire podcast summary with discussion highlights -- https://www.dchatte.com/episode-79-authenticate-without-storing-credentials-mit-scientist-cracks-the-code/Latest Articles and Press Release on The Cybersecurity Readiness Podcast Series:Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness, Yahoo!Finance, Dec 16, 2024Dr. Dave Chatterjee Hosts Global Podcast Series on Cyber Readiness, Marketers Media, Dec 12, 2024.Cybersecurity Readiness Podcast by Dr. Dave Chatterjee Reaches 10,000 Downloads Globally, Business Insider/Markets Insider, Dec 10, 2024.Connect with Host Dr. Dave Chatterjee and Subscribe to the PodcastPlease subscribe to the podcast so you don't miss any new episodes! And please leave the show a rating if you like what you hear. New episodes are released every two weeks. Connect with Dr. Chatterjee on these platforms: LinkedIn: https://www.linkedin.com/in/dchatte/ Website: https://dchatte.com/Cybersecurity Readiness Book: https://www.amazon.com/Cybersecurity-Readiness-Holistic-High-Performance-Approach/dp/1071837338https://us.sagepub.com/en-us/nam/cybersecurity-readiness/book275712Latest Publications & Press Releases:Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness

Hacking Humans
personally identifiable information (PII) (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Nov 19, 2024 7:26


A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data. 

noun personally identifiable information pii
Word Notes
personally identifiable information (PII) (noun)

Word Notes

Play Episode Listen Later Nov 19, 2024 7:26


A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data.  Learn more about your ad choices. Visit megaphone.fm/adchoices

noun personally identifiable information pii
Moody’s Talks: KYC Decoded
Unmasking the threat: The dark reality of synthetic identities

Moody’s Talks: KYC Decoded

Play Episode Listen Later Oct 11, 2024 42:05


From social media account information to password creation to IP addresses, the digital footprint we create grows larger every time we go online – and it is virtually impossible to avoid.  At the same time, sophisticated criminals can capture this wealth of Personally Identifiable Information (PII) and create synthetic identities to commit crimes like fraud, money laundering, illegal weapons dealing, and more.Although scary, the first thing we can do to combat this criminal behavior is learn about it. So, we are excited to share the mic with Constella's experts, Jason Wagner, Vice President of Identity & Digital Intelligence, and Dan Mathews, Director of Worldwide Sales Engineering.You do not want to miss this incredibly engaging and knowledgeable conversation with host, Alex Pillow, asking hard-hitting questions like:What is a synthetic identity?What threats do synthetic identities pose to the financial sector at large?How are criminals stealing data?What populations and kinds of businesses are most vulnerable to the risks associated with synthetic identities?What are “ghosts” in the context of synthetic identities, and how can they attack businesses?How is AI changing the landscape of creating synthetic identities?How can the risks created by synthetic identity fraud be mitigated?To learn more about topics discussed on this episode, check out the resources mentioned below:Constella blogConstella Intelligence LinkedIn accountConstella's 2024 Identity Breach ReportIf you want to be at the forefront of combatting financial crime in your organization, visit our website to see how we can help, and feel free to get in touch – we would love to hear from you.

Used Car Dealer Podcast
UCDP Ep #64 - Interview with Todd Smith on Identity Verification & Fraud Prevention in the Auto Industry

Used Car Dealer Podcast

Play Episode Listen Later Aug 9, 2024 56:08


In this episode of the Used Car Dealer Podcast, Zach interviews Todd Smith, founder of QoreAI, a startup focused on identity verification and transactional fraud prevention in the automotive space. They discuss the recent CDK DMS hack, the prevalence of transactional fraud, and the future of secure document management in the automotive industry. The conversation also delves into how technology impacts credit affordability and what dealers can do to enhance their security measures.Some of the questions asked on the podcast include:Q) Todd, can you share your background and how you started in the automotive industry?Q) What inspired you to focus on identity verification and fraud prevention in the automotive space with your latest startup?Q) What are your thoughts on the recent CDK hack and its impact on the automotive industry?Q) How prevalent is transactional fraud in the used car industry, and what types of fraud do dealers commonly face?Q) Can you explain how secure deal document management works and its importance for protecting Personally Identifiable Information (PII)?Q) How does credit affordability impact a customer's ability to purchase a vehicle? What trends are you seeing, and what role does technology play?Q) How does QoreAi assist dealers with identity verification and fraud prevention?Q) What challenges do dealers face when implementing security measures, and how can they overcome them?Q) How do you see the future of identity verification and secure document management evolving in the automotive industry?Q) Are there any upcoming regulatory changes regarding data protection and identity verification that dealers should be aware of?Q) What advice would you give to dealers starting to focus on improving identity verification and fraud prevention processes, and how can they stay ahead in protecting customer data and ensuring secure transactions?Listen to our other podcast episodes: https://www.sellyautomotive.com/podcastTranscribe of this podcast - https://blog.sellyautomotive.com/blog/todd-smith

The Artificial Intelligence Podcast
Hackers use AI in Tax Fraud Scams

The Artificial Intelligence Podcast

Play Episode Listen Later Mar 18, 2024 3:17


Tax fraud is evolving with the use of artificial intelligence (AI) by hackers. They are employing AI-powered techniques such as identity hijacking to file tax returns under other people's names and redirect the refunds to their own accounts. This alarming trend has been observed on the dark web. AI tax fraud involves stealing Personally Identifiable Information (PII) through phishing scams or malware and creating fraudulent IDs with the victim's details but the scammer's photograph. To combat this, experts recommend implementing more robust verification processes, such as cross-referencing IDs with DMV records. Individuals should file taxes early and take steps to protect themselves, including using strong passwords, employing identity theft protection services, and being cautious of suspicious links and downloads. The IRS website provides guidance for victims of tax fraud. --- Send in a voice message: https://podcasters.spotify.com/pod/show/tonyphoang/message

The Shifting Privacy Left Podcast
S3E1: "Privacy-preserving Machine Learning and NLP" with Patricia Thaine (Private AI)

The Shifting Privacy Left Podcast

Play Episode Listen Later Jan 2, 2024 36:53 Transcription Available


My guest this week is Patricia Thaine, Co-founder and CEO of Private AI, where she leads a team of experts in developing cutting-edge solutions using AI to identify, reduce, and remove Personally Identifiable Information (PII) in 52 languages across text, audio, images, and documents.In this episode, we hear from Patricia about: her transition from starting a Ph.D. to co-founding an AI company; how Private AI set out to solve fundamental privacy problems to provide control and understanding of data collection; misunderstandings about how best to leverage AI regarding privacy-preserving machine learning; Private AI's intention when designing their software, plus newly deployed features; and whether global AI regulations can help with current risks around privacy, rogue AI and copyright.Topics Covered:Patricia's professional journey from starting a Ph.D. in Acoustic Forensics to co-founding an AI companyWhy Private AI's mission is to solve privacy problems and create a platform for developers to modularly and flexibly integrate it anywhere you want in your software pipeline, including  model ingress & egressHow companies can avoid mishandling personal information when leveraging AI / machine learning; and Patricia's advice to companies to avoid mishandling personal information Why keeping track of ever-changing data collection and regulations make it hard to find personal informationPrivate AI's privacy-enabling architectural approach to finding personal data to prevent it from being used by or stored in an AI modelThe approach that Privacy AI took to design their softwarePrivate AI's extremely high matching rate, and how they aim for 99%+ accuracyPrivate AI's roadmap & R&D effortsDebra & Patricia discuss AI Regulation and Patricia's insights from her article 'Thoughts on AI Regulation'A foreshadowing of AI's copyright risk problem and whether regulations or licenses can helpChatGPT's popularity, copyright, and the need for embedding privacy, security, and safety by design from the beginning (in the MVP)How to reach out to Patricia to connect, collaborate, or access a demoHow thinking about the fundamentals gets you a good way on your way to ensuring privacy & securityResources Mentioned:Read: Yoshua Bengio's blog post: "How Rogue AI's May Arise"Read: Microsoft's Digital Defense Report 2023Read Patricia's article, “Thoughts on AI Regulation” Guest Info:Connect with Patricia on LinkedInCheck out Private AI Demo PrivateG Privado.ai Privacy assurance at the speed of product development. Get instant visibility w/ privacy code scans.Shifting Privacy Left Media Where privacy engineers gather, share, & learnTRU Staffing Partners Top privacy talent - when you need it, where you need it.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Copyright © 2022 - 2024 Principled LLC. All rights reserved.

Partially Redacted: Data Privacy, Security & Compliance
Why PII Data Isolation Matters with Skyflow's Roshmik Saha

Partially Redacted: Data Privacy, Security & Compliance

Play Episode Listen Later Nov 15, 2023 43:40


In this episode, Roshmik Saha, Co-founder and CTO of Skyflow, discusses the critical importance of Personally Identifiable Information (PII) data isolation. The principle is straightforward—separate sensitive and non-sensitive data for effective data governance and privacy. The conversation covers historical origins, government use, and real-world examples from companies like Apple and Google. The episode explores why PII isolation is vital, detailing risks and consequences of not implementing it effectively. Roshmik contrasts data isolation with encryption and access control, emphasizing practicality. "Zero trust" in data security is introduced as a verification-centric approach. Challenges in isolating PII are acknowledged, with a focus on security principles. Best practices for PII isolation include a "need to know" basis and fine-grained access control. Roshmik provides advice for organizations, urging them to prioritize isolation, avoid integration pitfalls, and adopt a zero-trust mindset for enhanced data security.

google apple challenges data isolation cto saha pii skyflow personally identifiable information pii
The Treasury Career Corner
Lessons in Treasury Evolution and Innovations with Sassan Parandeh

The Treasury Career Corner

Play Episode Listen Later Oct 10, 2023 44:44


In this episode of the Treasury Career Corner podcast, Sassan Parandeh, the Global Treasurer and Head of Insurance, Risk and Property Management Departments at ChildFund International, shares his career journey in treasury and the innovative solutions he has implemented in his current role.As a finance, treasury, and insurance expert Sassan has extensive expertise in various areas such as global leadership, cyber security, PCI compliance, insurance and risk management, cryptocurrency, capital-credit structuring and retirement plans. In 2023 he successfully won the Gold Alexander Hamilton Award for strengthening security and controls over Personally Identifiable Information (PII) and Payment Card Industry data that transformed his department into a cyber-incident-resilient cash fortress.In 2014 he received the Grand Pinnacle Award for payment system innovations that funded remote and underbanked locations in the developing world. Sassan serves as the Principal of the Cyber Incident Response team at ChildFund International. He developed the organization's first cyber incident response plan, optimized cyber insurance policies, conducted tabletop simulations, and implemented communication systems and emergency response protocols. Sassan holds a Master of Business Administration (MBA) from Loyola Marymount University, a Master of Public Administration from California State University, Long Beach, and a Bachelor of Arts in Economics from California State University, Long Beach. He is also a Certified Treasury Professional (CTP) and a member of the Board of Directors of the Association for Financial Professionals (AFP).Aside from this he has also been published in professional and academic journals and he has been interviewed and quoted in various media outlets. Some of his publications include articles in AFP Exchange Magazine and featured interviews on BBC Global News and Treasury & Risk Magazine.On the podcast we discuss… Sassan's accidental entry into treasuryThe changes he has witnessed in the field over the years The importance of staying relevant and adapting to new technologies and risksThe evolution of treasury operations and the challenges he has faced in different industriesThe innovative solutions implemented by Sassan and his team at ChildFund InternationalThe importance of networking and staying connected with the treasury communitySassan's involvement with the Association for Financial Professionals (AFP)Why you should engage with professional organizations to stay informed and learn from others in the field.You can connect with Sassan Parandeh on LinkedIn. Are you interested in pursuing a career within Treasury?Whether you've recently graduated, or you want to search for new job opportunities to help develop your treasury career, The Treasury Recruitment Company can help you in your search for the perfect job. Find out more here. Or, send us your CV and let us help you in your next career move!If you're enjoying the show please rate and review us on whatever podcast app you listen to us on, for Apple Podcasts

#TWIMshow - This Week in Marketing

Episode 181 contains the important Digital Marketing News and Updates from the week of Oct 2-6, 2023.1. New Courses to Unlock the Power of Reddit Ads - If you're a business owner looking to diversify your online advertising, Reddit has some exciting news for you. The platform has updated its "Reddit Ads Formula" marketing education program, adding a new "Boost 2.0 Certification" to its existing courses. What does this mean for you? It's a golden opportunity to understand Reddit's advertising tools better and use them to your advantage.Originally launched last June, Reddit Ads Formula offers a straightforward guide to Reddit's advertising options. The new Boost 2.0 Certification takes it a step further by providing in-depth knowledge and insights. The course covers essential topics like selecting the right bid and budget strategy, identifying performance opportunities, and effectively engaging Reddit communities. Completing the course earns you a certification badge, which can add credibility to your business. Plus, you'll have the option to make a Reddit-funded donation to charity.Why is this important? Reddit is a growing platform with a diverse user base, making it a fertile ground for advertising. The new courses aim to help you optimize your ad campaigns, thereby increasing your reach and ROI. With over 5,800 participants from 26+ countries already benefiting from the program, it's time you consider hopping on the Reddit advertising bandwagon.2. LinkedIn Testing Fully Automated Accelerate Ad Campaigns - LinkedIn is stepping up its advertising game with a new feature called "Accelerate," designed to automate your entire ad campaign process. If you're a business owner, this is big news. Why? Because advertising on platforms like LinkedIn can be complex and time-consuming. Accelerate aims to simplify this by recommending a complete campaign in as little as five minutes.Here's how it works: You provide a URL for the product you want to promote, and LinkedIn's AI systems take care of the rest. The AI analyzes your company's LinkedIn page, past ads, and the website you shared to create a tailored campaign. You can then fine-tune the campaign's copy, images, and targeting parameters. The AI also adjusts your campaign bids and budget in real-time to maximize results.Why should you care? LinkedIn claims that its AI tools have led to a 47% improvement in cost-per-conversion and a 21% improvement in average cost-per-lead. Essentially, you're letting LinkedIn's AI manage your ad budget in the most efficient way possible, which could save you both time and money.The Accelerate feature is currently available to a limited number of customers in North America. It's a hands-off approach to LinkedIn ads that could make your life a lot easier. So, is it time to let AI take the wheel in your LinkedIn advertising? It might be worth a try.3. Meta Expands Roll Out of Generative AI Features for Ad Creation - Meta, the company behind Facebook, has recently expanded its Generative AI features for ad creation. These features include text variations, background generation, and image expansion tools. What does this mean for you as a business owner? It means you can now create more dynamic and personalized ads with just a few clicks, saving you both time and money.In early tests, advertisers found that these AI tools saved them an estimated five or more hours a week. That's almost a month's worth of time saved per year! These tools not only speed up the ad creation process but also help in maximizing the effectiveness of your campaigns. For instance, you can quickly develop multiple variations of ad creatives, which allows for more strategic work and better performance.But that's not all. Meta is also developing AI tools for business messaging on platforms like Messenger and WhatsApp. These tools will help you engage with customers more effectively, offering instant conversational responses.In summary, Meta's new AI features are designed to make your life easier by automating tedious tasks, allowing you to focus on strategy and creativity. These tools are rolling out globally and are expected to be fully available by next year. Don't miss out on this opportunity to take your advertising to the next level.4. Meta's New Subscription Model Could Change Your Business Advertising Strategy - Meta, the parent company of Facebook and Instagram, is planning to introduce a subscription-based model that offers an ad-free experience for $14 a month. This move is in response to the European Union's Digital Services Act, which will take effect on January 1, 2024. The act requires platforms to seek user consent for serving personalized ads, impacting businesses that rely heavily on ad revenue.Why is this important for you as a business owner? Well, if users opt for this subscription, they won't see ads, which could significantly reduce the reach of your advertising campaigns on these platforms. This means you might need to rethink your advertising strategies and possibly invest in alternative platforms for better visibility.Meta has not yet made an official statement about this new model, but it's crucial to stay ahead of the curve. The cost of the subscription could be a determining factor for user adoption. If fewer people see your ads because they've opted for the ad-free subscription, you'll need to adapt quickly to maintain your online presence and customer engagement.Stay tuned for more updates on this developing story, as it could have a significant impact on how you approach advertising on social media platforms.5. TikTok Testing Subscription Plan - TikTok is exploring a new avenue to enhance user experience: an ad-free subscription plan. This move comes as social media platforms are grappling with changes in digital privacy regulations, particularly in the European Union. The new plan would cost users around $4.99 per month to enjoy an ad-free TikTok experience.Why is this important for you as a business owner? Ads are the lifeblood of social media platforms, helping businesses like yours reach potential customers. However, with increasing regulations and user demands for a cleaner interface, platforms are considering alternative revenue streams. TikTok's ad-free subscription is not just a user-centric move; it's a signal of changing tides in the digital advertising landscape.This shift could impact how you allocate your advertising budget and engage with your audience on TikTok. It's also worth noting that while this feature is currently in the testing phase and targeted at a single English-speaking market outside the U.S., it could potentially be rolled out more broadly in the future.6. New Google Rules for Email Marketing: What You Need to Know to Keep Your Business in the Clear! - Google is tightening its rules for businesses that send bulk emails to Gmail users. If your business sends more than 5,000 emails per day to Gmail addresses, you'll need to pay attention to these new guidelines, which will take effect in February 2024. The changes aim to reduce spam and improve email security, making it crucial for business owners to adapt. Strong Email Authentication: Google will require you to authenticate your emails using established protocols like SPF, DKIM, or DMARC. This ensures that your emails are genuine and not spam. Easy Unsubscribe: You'll need to provide an easy, one-click unsubscribe option in your emails. All unsubscribe requests must be processed within two days. Clear Spam Rate Threshold: Google will enforce a specific spam rate that you must not exceed. This will help keep your emails out of the spam folder. These new rules are not just about compliance; they're about maintaining a healthy relationship with your customers and ensuring your emails actually reach them. Even if your email list has fewer than 5,000 recipients, following these best practices is still recommended.By adhering to these new guidelines, you'll not only avoid potential penalties but also improve the effectiveness of your email marketing campaigns. Make sure to update your email practices before the February deadline to stay compliant.7. Google's new GA4 feature!

Privacy Files
Personally Identifiable Information (PII)

Privacy Files

Play Episode Listen Later Sep 15, 2023 49:44


We've talked a lot about social engineering on Privacy Files. It's commonly said that the human is the weakest link in data security. In this episode, we talk about what you could call unintentional social engineering. What if you had a story so compelling that employees of retail businesses would eagerly hand over personally identifiable information (PII) about strangers? In this interview, we talk to someone who recently had his wallet stolen while at the local gym. While the story about the stolen wallet, the ensuing investigation and eventual recovery is interesting in and of itself, it's not the most important lesson. Shockingly, what we discover is how easy it can be to persuade employees to freely share personal information about others, especially when the mission appears to be a noble one. But it leaves us wondering how many bad actors try this approach by concocting a story that sounds convincing. It's yet another lesson highlighting just how easy it is for your personal data to end up in the hands of someone with bad intentions. This episode will also leave you rethinking just how much you really need to take with you in your wallet or purse when leaving home. Overall, we hope this story encourages you to compartmentalize your online and offline life to limit your personal data trail and ultimately your exposure to data leaks and breaches. OUR SPONSORS: Anonyome Labs - Makers of MySudo and Sudo Platform. Take back control of your personal data. www.anonyome.com MySudo - The world's only all-in-one privacy app. Communicate and transact securely and privately. Talk, text, email, browse, shop and pay, all from one app. Stay private. www.mysudo.com MySudo VPN - No personal information required to sign up. You don't even need a username and password. Finally, a VPN that is actually private. https://mysudo.com/mysudo-vpn/ Sudo Platform - The cloud-based platform companies turn to for seamlessly integrating privacy solutions into their software. Easy-to-use SDKs and APIs for building out your own branded customer apps like password managers, virtual cards, private browsing, identity wallets (decentralized identity), and secure, encrypted communications (e.g., encrypted voice, video, email and messaging). www.sudoplatform.com

talk communicate apis vpn shockingly sdks pii personally identifiable information pii mysudo
Privacy Please
S4, E175 - Jane Lee, Trust and Safety Architect at Sift

Privacy Please

Play Episode Listen Later Aug 9, 2023 44:17


Get ready for an enthralling episode of "Privacy Please" as we sit down with the brilliant Jane Lee, a seasoned Trust and Safety Architect at Sift. Join us as we unravel a captivating conversation that delves deep into Jane's journey and expertise. From the intriguing world of machine learning to an insightful exploration of the "pig butchering" investigation, we leave no stone unturned. Uncover the inner workings of culture and privacy within tech giants like Facebook, and discover the pivot from Personally Identifiable Information (PII) to the fascinating realm of behavioral analysis. But that's not all – we'll also navigate the complex landscape of encryption's limitations and peer into the horizon of crypto's scope and scale. Tune in for a thought-provoking exchange that promises to broaden your understanding of privacy, innovation, and the digital world at large. Instacart - Groceries delivered in as little as 1 hour. Free delivery on your first order over $35.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the show

InfosecTrain
Cyber Attack vs. Data Breach

InfosecTrain

Play Episode Listen Later Jul 18, 2023 5:20


Cyber attacks and data breaches are constantly surging due to our increasing dependence on technology and the widespread use of interconnected devices. This expanding landscape creates numerous opportunities for cybercriminals to exploit vulnerabilities and compromise sensitive information. Regrettably, many companies or individuals fail to implement sufficient security measures, leaving their systems vulnerable to compromise and increasing the likelihood of cyber attacks and data breaches. In this article, we will talk about cyberattacks, data breaches, and the differences between the two. What is a Cyber Attack? A cyber attack is an intended and malicious attempt to compromise the security, integrity, or availability of a system, network, or data by an external or internal threat actor or hacker. It can take various types and have diverse objectives, such as stealing sensitive information, financial gain, disrupting operations, spreading malware, revenge, espionage, or reputational damage. It poses severe risks to businesses, the nation, and individuals, requiring a strong cybersecurity strategy to prevent, discover, and address them. What is a Data Breach? A data breach is a cyber incident in which an unauthorized person gains access to or steals sensitive data stored, processed, or transmitted by a system or network. The data may consist of Personally Identifiable Information (PII), financial data, medical records, or other private details. Numerous factors, such as a cyber attack, configuration error, human error, or physical theft, can cause it. It can have adverse effects on individuals and organizations, such as identity theft, financial losses, reputational damage, legal liabilities, or regulatory fines. View More: Cyber Attack vs. Data Breach

cyber numerous data breach regrettably personally identifiable information pii
Partially Redacted: Data Privacy, Security & Compliance
'Cybersecurity is Failing Us' with Skyflow's Anshu Sharma

Partially Redacted: Data Privacy, Security & Compliance

Play Episode Listen Later Jun 14, 2023 42:17


In this episode, Anshu Sharma, CEO and co-founder of Skyflow highlights the alarming disparity between the millions of dollars companies invest in cybersecurity and the persistent occurrence of breaches and cyber attacks. Despite these hefty investments, current approaches to cybersecurity are simply not enough to protect customer data. It's like putting a bandaid on a broken arm - it might temporarily cover the problem, but it won't heal the underlying issue. According to Anshu, what we truly need is a security by default approach. We require systems that not only secure customer Personally Identifiable Information (PII) but also understand and handle the various types of workflows involving PII. This means implementing measures that go beyond mere protection and actively support the necessary tasks and operations involving sensitive data. Skyflow has developed technology that addresses these challenges. Skyflow not only ensures the security of PII but also supports the specific workflows associated with it. By doing so, Skyflow's technology effectively insulates applications from the burdensome responsibility of managing customer data, allowing organizations to focus on their core business objectives. Topics: Are we getting better at protecting customer data or worse? Why has the software industry failed at cybersecurity? How do you think the trend towards increased regulation and oversight of the cybersecurity industry will impact the development and adoption of new security technologies? What is security-by-default? What are some of the tactics companies can use to build products that are secure-by-default? How does this approach potentially change the culture of the company? What's an example of a company building products with security built-in? What inspired you to start Skyflow, and how does your solution address the current challenges with cybersecurity in the software industry? What is the key difference between what Skyflow offers and what's historically been done by businesses for data protection? How do you see the software industry evolving in terms of cybersecurity in the next few years, and what role do you think companies like Skyflow will play in this transformation? What's next for Skyflow? Resources: The software industry has failed at cybersecurity. What, now? Privacy by Architecture with Anshu Sharma

ceo failing privacy architecture sharma pii anshu skyflow personally identifiable information pii anshu sharma
Cyber Security Matters, hosted by Dominic Vogel and Christian Redshaw
Ep. 172: Privacy for Cars - There's a Lot More Road to Go

Cyber Security Matters, hosted by Dominic Vogel and Christian Redshaw

Play Episode Listen Later Apr 5, 2023 14:18


Andrea Amico and Brett Jones are today's guests on the Cyber Security Matters podcast, hosted by Dominic Vogel and Christian Redshaw.    Andrea Amico is the founder and CEO of Privacy4Cars.  Brett Jones is the President of HeyAuto and Vivid Theory.     Privacy4Cars app was created by Andrea to intuitively and rapidly delete Personally Identifiable Information (PII) from vehicles while building a compliance log to meet privacy regulations.  HeyAuto is Canada's fastest growing car marketplace that has partnered with Privacy4Cars to bring this technology to Canada's automotive retail industry.   In this episode, we will cover: How our vehicles acquire and store our personal data through internal sensors and create a “mini copy” of our connected smart devices Examples of what kind of data is being captured by the vehicles we drive: such as home address, garage door codes, text messages, contact lists, etc. The need for clear industry standards and processes around wiping private data from used cars How the vehicle retail industry still has a lot more road to go in when it comes to protecting people's private data that is stored in vehicles

ceo canada president cars privacy brett jones personally identifiable information pii dominic vogel cyber security matters
Passage to Profit Show
Expand into Multiple Career Paths with Amy Scruggs, 02-19-2023

Passage to Profit Show

Play Episode Listen Later Feb 20, 2023 66:03


Elizabeth Gearhart, co-host of The Passage to Profit Show along with Kenya Gipson interview Media Coach, TV host and Recording Artist, Amy Scruggs, Tom D'Eri author of The Power of Potential and Jackie Berman from LegalShield and IDShield. Amy Scruggs uses her 20 years’ experience as a Media Executive, TV host, Recording Artist, Public Speaker, Corporate Spokesperson, and Sales Professional, to help others present and communicate a concise and professional message, for TV, podcasts, ZOOM, social media, or public speaking appearances. Her recent release on her EP is “Something to Believe In”. Her EP includes the 2022 hit song "What If It All Goes Right" charting on radio worldwide along with reaching #66 on the Music Row Charts and selected for the New York Times Summer 2022 playlist. Read more at: https://www.amyscruggsmedia.com/ and at: https://www.amyscruggsmusic.com/ Tom D’Eri is the founder of Rising Tide Car Wash in Florida and the author of the book, "The Power of Potential". Tom’s car wash is one of the highest-volume washes in Florida. Its employee retention rate is five times that of its competitors and over 500,000 cars a year drive away sparkling. Roughly 80 percent of Rising Tide’s workforce is made up of people with autism. The Power of Potential tells the inspiring story behind this highly successful business. Read more at: https://www.risingtidecarwash.com/power-of-potential Jackie Berman is a Licensed Independent Associate with LegalShield and IDShield. She offers legal services for individuals and families, gun owners and to commercial and Uber drivers. For a low fee, LegalShield gives you the ability to talk to a lawyer on personal legal matters. IDShield monitors your Personally Identifiable Information (PII) from all angles, and if your identity is stolen, they provide full-service identity restoration. Read more at: https://jacklynberman.wearelegalshield.com/ Visit https://passagetoprofitshow.com/ for the latest updates and episodes.

The Bottom Line Pharmacy Podcast: Sykes & Company, P.A.
The Bottom Line Pharmacy Podcast: Technology, Security and Your Pharmacy

The Bottom Line Pharmacy Podcast: Sykes & Company, P.A.

Play Episode Listen Later Oct 3, 2022 37:22


Pharmacies collect Personally Identifiable Information (PII) and Protected Health Information (PHI) from their patients to dispense prescription drugs and to maintain appropriate records. Therefore, the duty to maintain the privacy of this information in this digital world is paramount. That's why cybersecurity is gaining traction in the pharmacy industry.In this episode, we discuss various types of security threats, basic planning tips and opportunities pharmacies can take now to help mitigate this potential risk inside your pharmacy.Join our independent pharmacy CPAs, Bonnie Bond, CPA, Kendell Harris, CPA and Scotty Sykes, CPA, CFP® on this episode of The Bottom Line Pharmacy Podcast as they talk with Chris Sykes, IT Director at Sykes & Company, P.A. on the show.Listen on Spotify: https://open.spotify.com/show/1VStwVBZ5Y7OIy2REiJPFV Listen on Stitcher: https://www.stitcher.com/show/the-bottom-line-pharmacy-podcast--sykes---company--p-a- Listen on Amazon Music: https://music.amazon.com/podcasts/ba5b39de-b2b0-4fe7-9691-271dc13bfe58/the-bottom-line-pharmacy-podcast-sykes-company-p-a 

Chattinn Cyber
Cybersecurity For M&A Deals With Steven Kuperschmid

Chattinn Cyber

Play Episode Listen Later Aug 13, 2022 21:14


In this episode of CHATTINN CYBER, Marc Schein interviews Steven Kuperschmid, Co-Chair of Cybersecurity and Data Privacy at Ruskin Moscou Faltischek PC. Steven is experienced as a corporate M&A and securities lawyer. During the conversation, Steven shares his knowledge about cybersecurity in M&A deals, how (or whether) it impacts contracts and the different phases to setting an effective buyer-seller deal. He also talks about the growing need for cyber insurance in different industries today. At what point does cybersecurity integration happen within an M&A deal? Steven explains that it depends on the nature of the target's business. For the middle and upper-middle markets, like manufacturing and distribution, industrial technology, financial services, and healthcare, cybersecurity needs to be a priority. You must know whether the target business has Personally Identifiable Information (PII) - if so, cybersecurity needs to be prioritized irrespective of the industry. However, cybersecurity doesn't change different deal structures. Because a deal is chosen for tax reasons to mitigate the buyer's risk, cybersecurity is a far bigger problem than the signed contract. As for the signing of a deal, there are different phases: The discussion phase, where the buyer assesses the value offered by the seller and considers the different risks that might exist. The buyer then assesses the business from a technology point of view, evaluating the seller's internal policies and cyber hygiene. Lastly, a buyer does a lien search, looking at the lien report to gather more information about the buyer and their underlying debt instruments. Further in the conversation, Steven covers cyber insurance, explaining its relevance and importance in the cyber security industry. Having a good cyber insurance grasp can ensure the buyer can benefit from them during a data breach. Listen to the conversation for more details! Highlights: “Often, deal structure is chosen for tax reasons. But also, it's chosen to mitigate risk to the buyer. So you may choose an asset deal, because you don't want to incur any unknown liabilities that you can avoid by choosing an asset structure.” “I think the first thing the team needs to look at is the nature of the target, what's the targets business, you know, certain industries present greater risks than others. So if we were buying a company in the healthcare industry, or the financial services industry, it should be a huge focus, and usually is at this point now, now, four years ago, five years ago, maybe it wasn't as big a focus as it is today. But in those industries, it should be a huge focus.” “Every deal starts with a discussion of the business terms – the value of what's being paid, how it's being paid.” Time-Stamps: [00:53] - Steve's path to becoming one of the most well-known privacy attorneys in Long Island [10:47] - Does cybersecurity change different deal structures? [14:29] - The different phases of a buyer-seller deal [17:19] - A discussion on cyber insurance Connect with Steven: Website: https://www.linkedin.com/in/steven-kuperschmid-024375155                                          

deals cybersecurity long island co chair data privacy personally identifiable information pii
Digital Marketing with Bill Hartzer
Digital Marketing News April 28, 2022, Removing PII from Google, Domain Name Issues

Digital Marketing with Bill Hartzer

Play Episode Listen Later Apr 28, 2022 23:32


In this episode of the Digital Marketing with Bill Hartzer podcast, Bill Hartzer talks about the latest digital marketing news, including how to remove Personally Identifiable Information PII from Google. He also talks about some other Search-related news, as well as email filtering and the options for cleaning up your inbox. He discusses SaneBox and whether or not it worked for him. Finally, he talks about a stolen domain name case that has been very frustrating that's been ongoing for at least 5 weeks.

Radio ITVT
Televisionation Friday Fireside: Jesse Redniss on His New Privacy Enablement and Engagement Platform, Qonsent

Radio ITVT

Play Episode Listen Later Mar 7, 2022 27:35


This week's guest on the Friday Fireside is media luminary Jesse Redniss, Founder and CEO of privacy enablement and engagement platform, Qonsent. With a long history at NBCUniversal, Turner and WarnerMedia, Jesse has, like many of us, seen the shift in regulatory and consumer attitudes regarding use of Personally Identifiable Information (PII). What was previously accepted and acceptable is no longer, and that spells trouble for media, advertising and commerce. Qonsent has a solution that, in the opinion of the good doctor, will quickly become the industry standard. Watch and learn.

Hacking Humans
personally identifiable information (PII) (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Aug 3, 2021 6:56


A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data. 

noun personally identifiable information pii
Word Notes
personally identifiable information (PII) (noun)

Word Notes

Play Episode Listen Later Jul 13, 2021 6:56


A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data. 

noun personally identifiable information pii
Intelligent Multi-Cloud Data Management with Aparavi
Responding to Information Requests and Identifying Sensitive Data During a Pandemic

Intelligent Multi-Cloud Data Management with Aparavi

Play Episode Listen Later Dec 15, 2020 13:31


The Covid-19 pandemic has greatly increased the number of remote workers, creating a workforce that is more distributed than ever, and even more susceptible to data breaches. In addition, with more time spent at home, consumers are more likely to initiate data subject access requests (DSARs) or other information requests under the GDPR, CCPA, HIPAA, FOIA or other mandates. Those employees responsible for responding to the requests, however, are frustrated by lack of access or visibility into files containing Personally Identifiable Information (PII) or Sensitive Information across the enterprise. That's where Aparavi comes in. Aparavi's automated classification engine can quickly scan and identify any metadata or content pertaining to COVID-19, HIPAA, GDPR, CCPA or any one of our 140+ pre-built classification policies, no matter where it lives across your enterprise's storage landscape (core, cloud or endpoint). Using The Aparavi Platform as a search engine, employees can easily create powerful search queries or customized classification policies to find the information they need and quickly respond to information requests, ultimately saving the business time and money, and increasing efficiency. Visit us at www.Aparavi.com for more information about how we help with GDPR or HIPAA compliance.

Cybersecurity FOREVER
#112: What Is PII And PHI? Why Is It Important To Protect?

Cybersecurity FOREVER

Play Episode Listen Later Nov 9, 2020 4:47


Today I will discuss: 1. What is Personally Identifiable Information (PII) & Protected Health Information (PHI)? 2. What is the role of PII & PHI in cybersecurity? 3. Why do hackers always want to steal these information? Watch

protect phi pii personally identifiable information pii
Your Shopify business is a journey. We help navigate and accelerate growth in the complex world of ecommerce.
102: A Profit-Driven Approach To Performance Marketing Through Paid Media Feedback Loops

Your Shopify business is a journey. We help navigate and accelerate growth in the complex world of ecommerce.

Play Episode Listen Later Aug 16, 2020 40:40


Growth Mindset? Invest In Yourself Today!Being an entrepreneur truly is a life of learning. All it would take is a new idea, a strategy, a Shopify app, or a marketing platform to be the next thing you need to improve efficiencies, drive more revenue, and build lifetime customer loyalty for your Shopify brand.My guest in today’s episode is Simon Poulton the Vice President of Digital Intelligence at Wpromote. They the largest independent Digital Marketing Agency in the United States. They take their “Think Like a Challenger” mantra seriously by challenging the status quo to drive significant results and steal market share for clients. Wpromote uses a profit-driven marketing approach to increase customer lifetime value to impact the bottom line. Why outspend the competition when you can outsmart them?Learn more about the next wave of data-driven digital marketing. Specifically, how you can prepare your Shopify brand’s data today for the data processing tools and platforms of tomorrow.Digital marketing is fundamentally changing and as machine learning continues to take a larger role, you need to make sure the data we’re feeding the machines is accurate, enriched and granular. Exciting and timely episode. Let’s jump in...What You Will Learn TodayGranular approach to data extraction.Re-imagining a way to think about paid media feedback loops.How to implement the Shopify ecommerce values template for Google Tag Manager.Measure, analyze, and report on data to inform your digital marketing strategy across every channel.How Predictive Customer Lifetime Value (pCLV) is the key to unlocking sustainable growth.Links And Resources Mentioned In This EpisodeWpromote - Free 20-point Google Analytics Audit. (mentioned eCommerce Fastlane)Shopify Google Tag Manager TemplateThe Trade DeskLiveRampFind and fix Personally Identifiable Information (PII) in Google AnalyticsGeneral Data Protection Regulation (GDPR)California Consumer Privacy Act (CCPA)404 Error TrackingHotJarFullStoryUserTestingFacebook Atlas GraphFree Google Analytics TrainingThank You For ListeningI truly appreciate you choosing to listen today and for supporting the podcast and it's sponsors. If you enjoyed today’s show, please share it using the social media buttons on this page.I would also be so grateful if you would consider taking a minute or two to leave an honest review and rating for the show in iTunes. They’re extremely helpful when it comes to reaching our audience and I read each and every one personally!New Strategies Each Week To Help You Build And Scale Lifetime Customer Loyalty. SUBSCRIBE HERE!Being an entrepreneur is a life of learning. All it would take is a new idea, strategy, Shopify app, or marketing platform to be the next thing you need to drive more revenue and lifetime loyalty for your Shopify store. Subscribe to the podcast on iTunes, Stitcher, Google Play, or Spotify and don’t miss a single episode!REWIND : EPISODE SPONSORAutomated Backups. Painless Recovery.Accidents can happen and it can have major financial impact on your business. What happens when you install an app and it messed up your theme? Or you upload a product catalog with errors or a store collaborator deleted product images by mistake.Common myth; Shopify has a backup that you can use when something goes wrong with your store. Untrue! Myth busted. Shopify has no native backups.So what do you do? You use Rewind to protect your Shopify store with automated backups.Rewind should be the first app you install to protect your store against human error, misbehaving apps, or collaborators gone bad. It’s like having your very own magic undo button.The Rewind App is trusted by over 30,000 businesses from side hustles to the biggest online retailers like Gatorade and MVMT Watches.Best of all? Respond to any of their welcome emails and mention the eCommerce Fastlane Podcast and you’ll get your first month of backups absolutely free.Protect your business and get peace of mind with Rewind Backups. See acast.com/privacy for privacy and opt-out information.

Hoporenkv Podcast
Steps to Safeguard Protected Personally Identifiable Information (PII) for Federal Grand Awards

Hoporenkv Podcast

Play Episode Listen Later Jun 12, 2020 14:10


Today we have a conversation with Vince Franco, Compliance & Resource Development Director of the Native Learning Center joining Wilma Noah and Krystal Cedeno, Training and Development Specialist of the Native Learning Center. Vince and the NLC ladies discuss Steps to Safeguard Protected Personally Identifiable Information (PII) for Federal Grand Awards. Detailed Topics: - Accountability as described in the 2 CFR Part 200 Uniform Guidance (aka: Super Cicular) - What is personally identifiable information or data? - Step One: Discover where PII can be found - Step Two: Educate the staff about the risks - Step Three: Establish a process, monitor activities, and take action

Digital Impact Radio
Digital Impact Radio - Rajesh Tammana Talks about Oracle Data Safe (Ser3/E10)

Digital Impact Radio

Play Episode Listen Later Dec 17, 2019 6:57


Rajesh Tammana Talks about Oracle Data Safe available now, delivering automated protection to database information by monitoring database activity, configuration and access requests. The service can automatically discover and mask sensitive data, such as that containing Personally Identifiable Information (PII) on various Oracle Database Cloud and Autonomous Database services.

Security In Five Podcast
Episode 567 - What Is Personally Identifiable Information (PII) Really

Security In Five Podcast

Play Episode Listen Later Aug 27, 2019 6:18


We hear the term PII quite a bit. Personally Identifiable Information is at the center of the privacy discussion but what is it? This epsiode talks about the challenges of defining what PII is. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five Don't forget to subscribe to the Security In Five Newsletter. —————— Where you can find Security In Five —————— Security In Five Reddit Channel r/SecurityInFive Binary Blogger Website Security In Five Website Security In Five Podcast Page - Podcast RSS Twitter @securityinfive iTunes, YouTube, TuneIn, iHeartRadio,

google apple internet blog security web privacy tunein infosec pii personally identifiable information pii personally identifiable information
The Risk Management Association
The Proper Management of PII

The Risk Management Association

Play Episode Listen Later Nov 26, 2018 3:23


Mark Dreux, Business Development & Marketing Vice President at Digital Matrix Systems, discusses the enterprise level management of Personally Identifiable Information (PII) and how financial institutions can minimize potential risks of improper management.

management proper business development personally identifiable information pii marketing vice president
Tech2Ears
5 Tips for Cyber Security

Tech2Ears

Play Episode Listen Later Aug 6, 2018 17:49


M&N Communications has put together an IT Security Service that helps organizations train end users on IT Security and identify and implement the proper safeguards to protect Personally Identifiable Information (PII) and sensitive company data. The IT Security Service: 1.Provides online security awareness training and testing to all employees 2.Provides security awareness micro-training updates on a weekly basis 3.Provides monthly security awareness newsletters 4.Performs simulated Phishing attacks on your employee base 5.Creates written information security policies (WISP) 6.Performs and documents a detailed Security Risk Assessment/Security Audit Training topics include: • What is PII and Sensitive Data? • What happens if Data is Breached? • Breaches and How to Prevent them • Hackers • Phishing Scams • Phone Scams • Password Protection • Unsecured Wi-Fi access points • Ransomware • Encryption • Clean Desk Policy • How to Respond if a Breach has Occurred --- Support this podcast: https://anchor.fm/melvin-williams0/support

Data Futurology - Data Science, Machine Learning and Artificial Intelligence From Industry Leaders

In this episode we speak to Matt McDevitt, Director of Data Engineering at Think Big Analytics. We talk about: - his journey working in the US, UK, Europe and Japan as the company grew, - how big data, open source, data engineering and data science work together, - General Data Protection Regulation (GDPR), Personally Identifiable Information (PII), data lineage - business value, data products and much more! Matt is one of Think Big’s earliest team members playing many roles to help incubate and build Think Big over its 8-year history into the leading Big Data Analytics Global brand. He helped build from scratch and establish Think Big practices in the United States in Mountain View, Salt Lake City, New York, London and Toyko. Matt assisted in the development of Think Big’s innovative Velocity Delivery methodology, which integrates Data Engineering and Data Science in 6-week release cycles. Show notes: www.datafuturology.com/podcast/9 Matt is based in: Tokyo, Japan --- Send in a voice message: https://anchor.fm/datafuturology/message

Google Cloud Platform Podcast
Sourcegraph with Quinn Slack

Google Cloud Platform Podcast

Play Episode Listen Later Sep 20, 2017 32:56


Sourcegraph provides navigation tools for source code, and it's powered by Go and Google Cloud Platform. Quinn Slack, CEO and co-founder, joins your co-hosts Francesc and Mark to discuss how they built their features on top of our infrastructure. About Quinn Slack Quinn Slack is CEO and co-founder of Sourcegraph, code intelligence software that lets software teams ship better and faster. Prior to Sourcegraph, Quinn co-founded Blend, an enterprise technology company with over 150 employees dedicated to improving home lending. His long-term goal is to build the products and infrastructure to support the future world where billions of people have coding fluency (just as billions of people today can read and write). Cool things of the week Introducing managed SSL for Google App Engine announcement With Forseti, Spotify and Google release GCP security tools to open source community announcement Global Kubernetes in 3 Steps on GCP medium by Christopher Grant Interview Sourcegraph Sourcegraph source code GitHub Google Container Engine Helm GitHub GCPPodcast #50 Helm with Michelle Noorali and Matthew Butcher sourcegraph.com Question of the week How can I automatically redact Personally Identifiable Information (PII) or other sensitive information? Data Loss Prevention API docs Demo of Data Loss Prevention at Cloud Summit Sydney YouTube Where can you find us next? Francesc will be presenting at Google Cloud Summit in Chicago next week. In October, he'll be presenting at Velocity London, Google Cloud Summit Paris and Devfest Nantes Mark is attending Strangeloop in September. He is also heading to Australia in October for GDG Devfest Melbourne and Game Connect Asia Pacific and will be hanging out at Unite Melbourne and PAX Australia.

HIPAA Talk
Where Do HIPAA, GLB, and ACA Compliance Requirements Intersect?

HIPAA Talk

Play Episode Listen Later May 3, 2017 8:20


This explains where HIPAA, Gramm-Leach-Bliley (GLB) and Personally Identifiable Information (PII) intersect and what health insurance agents must do in order to meet the requirements of the three. Also, answers the question, do agents need to send a Notice of Privacy Practices to comply with HIPAA? Jason Karn, Total HIPAA's chief compliance officer interviews David […]

compliance requirements hipaa intersect hipaa compliance personally identifiable information pii privacy practices
HIPAA Talk
Where Do HIPAA, GLB, and ACA Compliance Requirements Intersect?

HIPAA Talk

Play Episode Listen Later May 3, 2017 8:20


This explains where HIPAA, Gramm-Leach-Bliley (GLB) and Personally Identifiable Information (PII) intersect and what health insurance agents must do in order to meet the requirements of the three. Also, answers... Read More ›

compliance requirements hipaa intersect hipaa compliance personally identifiable information pii
Brakeing Down Security Podcast
2015-033: Data anonymization and Valuation, Privacy, and Ethical medical research

Brakeing Down Security Podcast

Play Episode Listen Later Aug 2, 2015 54:26


Katherine Carpenter is a privacy consultant who has worked all over the world helping to develop guidelines for ethical medical research, sharing of anonymized data, and helping companies understand privacy issues association with storing and sharing of medical data.   This week, we discuss how companies should assign value to their data, the difficulties of doing research with anonymized data, and the ramifications of research organizations that share data irresponsibly.   email contact: carpenter.katherinej@gmail.com http://jama.jamanetwork.com/article.aspx?articleid=192740   https://depts.washington.edu/bioethx/topics/consent.html https://en.wikipedia.org/wiki/De-anonymization https://en.wikipedia.org/wiki/Data_anonymization https://en.wikipedia.org/wiki/De-identification   https://en.wikipedia.org/wiki/International_Safe_Harbor_Privacy_Principles   http://www.nature.com/news/privacy-protections-the-genome-hacker-1.12940   http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/De-identification/guidance.html   https://en.wikipedia.org/wiki/Information_privacy_law   http://www.theguardian.com/technology/2015/apr/06/data-privacy-europe-facebook   http://www.theguardian.com/technology/2015/jun/15/eu-privacy-laws-data-regulations   http://www.theatlantic.com/technology/archive/2013/01/obscurity-a-better-way-to-think-about-your-data-than-privacy/267283/   http://fusion.net/story/171429/app-genetic-access-control-genes-dna-for-password/ ###   Katherine’s note, comment, and links. It is good to be thinking about de-identification (especially regarding health care data)   I think a better question to ask is how easy is it to re-identify information that has been de-identified. The HIPAA rule has 18 Identifiers which count as Personally Identifiable Information (PII) or Personal Health Information (PHI) include birth date, zip code, and IP address; When data is collected in non-health contexts, these identifiers are not considered PII/PHI (for example: this kind of information can be used for marketing purposes or financial/credit-related purposes).   A brief history on the topic: in 1997 a precocious grad student IDed the Governor of MA using purchased voter records to reID deIDed health information that was released. (This study was one motivator to pass HIPAA.) Further research along the same lines of the previous project can be summed up with a simple and scary statistic: in 2000, 87% of Americans may be uniquely identified by combining zip code, birthday and sex(gender).   For this reason, health information is threatened not only by deID’n & reID’n, but by the combination of and other types of information that are publicly available or available for purchase and could reveal things about an individual that would contribute to reID of individual’s health info.   Here are a bunch of articles that discuss the topic from different angles.   http://arstechnica.com/tech-policy/2009/09/your-secrets-live-online-in-databases-of-ruin/   https://datafloq.com/read/re-identifying-anonymous-people-with-big-data/228   http://www.bloomberg.com/news/articles/2013-06-05/states-hospital-data-for-sale-puts-privacy-in-jeopardy   https://epic.org/privacy/reidentification/   http://news.harvard.edu/gazette/story/2011/10/you%E2%80%99re-not-so-anonymous/   Dwork, C. and Yekhanin, S. (2008), “New Efficient Attacks on Statistical Disclosure Control Mechanisms,” Advances in Cryptology—CRYPTO 2008, to appear, also at http://research.microsoft.com/research/sv/DatabasePrivacy/dy08.pdf   Is Deidentification Sufficient to Protect Health Privacy in Research? Mark A. Rothsteinhttp://www.ncbi.nlm.nih.gov/pmc/articles/PMC3032399/

Security Current podcast - for IT security, networking, risk, compliance and privacy professionals

Healthcare providers have some of the most complicated environments with a multitude of systems, users and regulatory mandates. And often, according Barnabas Health CISO Hussein Syed, this leads to one of the biggest challenges, which is a misunderstood environment.  There concerns over Personally Identifiable Information (PII), as well as maintaining compliance with Payment Card Industry (PCI) mandates as healthcare providers generally take credit cards.  Further, because of the growing Internet of Medical Things with various equipment now networked, data leakage becomes a greater concern. And compounding this is are third party providers, from doctors to billing companies, working with healthcare providers, making security even more difficult.  As you'll hear from Hussein Syed as he speaks with Security Current's Vic Wheatman while at RSA it is a balancing act to provide access while ensuring security. They speak about these and other issues.

internet healthcare security rsa ciso personally identifiable information pii
Security Insider - Podcast Edition
Gambling with Guests - The House Doesn't Win with Unsecure PII

Security Insider - Podcast Edition

Play Episode Listen Later Sep 24, 2013 16:25


Is Your Property Management System Really Secure? According to a new report by British insurance firm WIllis Group Holdings, insurance claims for data theft worldwide jumped 56% last year, with 38% of those attacks targeting hotels, resorts, and casinos. Property Management Systems (PMS) contain a deep well of Personally Identifiable Information (PII), such as credit card numbers, phone numbers, email addresses, etc., which is often not properly secure within a PMS - leaving users at risk for a breach. Download this podcast to learn: How Property Management Systems can better secure guest data Why the hospitality industry is a target for data thieves How PMS vendors can boost their own security posture How ISVs and Solution Providers can gain additional revenue by offering stronger data security

Top Ranked (HD) - Channel 9
Top Ranked - Crash King

Top Ranked (HD) - Channel 9

Play Episode Listen Later May 8, 2012 13:06


Bad stuff happens! There is no way around that. It’s a fact; your apps, out there in the wild on consumers devices, will crash. This in itself is ok but only if you can get the information about those crashes and use that information to fix the bugs that cause them. The Windows Phone platform actually captures stack traces and provides those to you, the publisher of the app. You can get a view of the number of crashes that are happening as well as download an Excel file with all the appropriate information and stack traces. This is a good thing and you should take advantage of that information as it may give you some good clues as to what to fix to make your app a higher quality product.There are a few things that App Hub does not give you though. The first thing is that it may not give you enough information about the bugs that you are hitting. One example of that is that the version number of the app is not provided so if you have published a few different versions of your app it is possible that a user is hitting a bug that you may have already fixed in a later version. The other issue is that stats on App Hub are delayed. As a result you don’t see the issues that your end-users are hitting for a few days. If something is happening out there that is causing a lot of crashes then you may not see it until after users start posting lots of low ratings and negative reviews. Another thing to keep in mind is that App Hub does not provide any sort of notification of issues. It’s up to you to visit App Hub regularly and pull down those stack traces to see what’s going on. Finally (and I realize this is more a perception thing than an issue) end-users have no idea that the platform is gathering up those stack traces and making them available to you. And, of course, they have no idea if you are looking at those traces and working on bug fixes. As a result, when they see a bug most will assume the worst and give bad ratings and reviews. As I’ve mentioned on a previous post you really want to make sure that, whenever you can, you provide the ability for the end-user to provide you feedback as that helps build a relationship which ultimately will result in higher ratings and ranking.Fortunately there is a way to get around all of these issues. Andy Pennell, a colleague on the Windows Phone dev team has posted some sample code which he dubbed Little Watson that I think every developer should include in all their apps. Just like “Big” Watson does on Windows, that code does exactly what you would expect in that it captures all that stack trace info (including additional info you may need) and allows the end user to email it you so you can get to work fixing whatever bug caused the error.Little Watson is pretty easy to use. There are a few steps that you need to do:The first is to include the LittleWatson.cs in your project Then you need to let Little Watson know every time an exception happens. When you do that Little Watson captures the trace info to isolated storage. This is done by calling LittleWatson.ReportException. You’ll need to do that in both RootFrame_NavigationFailed and Application_UnhandledException. Both of those are in App.xaml.cs Finally to allow the end user to send you the stack trace you’ll need to add a call to LittleWatson.CheckForPreviousException() in the constructor for your main page (i.e. whatever page it is that your app launches into, usually that is MainPage.xaml.cs). When you make that call Little Watson checks for an exception report file in isolated storage and if one exists prompts the end user to send it to you via email. Since Andy blogged about Little Watson, other devs have grabbed that great idea and taken it further. One example of that is the Northern Lights open source project. Northern Lights has many different capabilities that are useful to Windows Phone developers. One of those is an implementation of Little Watson based on the work I mentioned above from Andy Pennell. One thing that Northern Lights does beyond Andy’s code is that they provide you the capability to automatically send the trace info to a web service behind the scenes so that the end user does not have to see it. You should probably be careful in doing something like that. As I mentioned above, it might actually be a good thing for end-users to know that you care about bugs. You may also want to be careful about sending stuff to a web service behind the users back. Some users will get freaked out about that if they notice. This would be especially bad if you were including any sort of Personally Identifiable Information (PII) along with those traces. In general, you’ll probably want to let users know somehow that you are doing that and definitely stay away from capturing any PII.On my blog I’ve included the source code for the project I used in the video. It’s a ridiculously dumb app but I often get asked for source so I’m including it for completeness. Let me know what you think about this episode of Top Ranked.If you have questions about any of the videos, about problems or issues you’re hitting or if you have topics that you think would be of interest to other devs on the Windows Phone platform then drop me a note. I’d be particularly interested in hearing about some of the best practices you’ve adopted that you think have raised your quality or your ratings/ranking in the Marketplace. I’ll be sure to give full credit and link love whenever I can.The Top Ranked series is hosted on Channel 9. You can view all the past videos there. You can also subscribe to the entire series via Zune or iTunes. All of that is available here: https://channel9.msdn.com/Series/Top-RankedLet me know what you think by dropping me a note with the contact form on my blog here: https://blogs.msdn.com/b/benriga/contact.aspxOr better yet follow me on twitter and drop me a note there: https://twitter.com/benriga

UC Berkeley Events - 2012 Podcasts
The PII Problem: Privacy and a New Concept of Personally Identifiable Information

UC Berkeley Events - 2012 Podcasts

Play Episode Listen Later Jan 9, 2012 66:48


Personally Identifiable Information (PII) is one of the most central concepts in information privacy regulation, but there is no uniform definition of it. Moreover, the US and European Union approach this topic in different ways. Computer science has shown that PII and non-PII are not immutable categories. Hear Professors Paul Schwartz (Berkeley Center for Law & Technology) and Daniel Solove (GW Law) present their new paper “The PII Problem,” which discusses personally identifiable information and proposes a concept entitled "PII 2.0." A panel discussion moderated by Jules Cohen with Chris Calabrese, D. Reed Freeman, Jr and Maneesha Mithal follows.

technology law european union computers concept privacy pii personally identifiable information pii personally identifiable information
Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference
Kimber Spradin and Dale Brocklehurst: Auditing Data Access Without Bringing Your Database To Its Knees

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference

Play Episode Listen Later Jun 4, 2006 63:50


Today’s privacy requirements place significant additional auditing burdens on databases. First you have to know which databases in your environment contain regulated Personally Identifiable Information (PII) or Protected Health Information (PHI), then you have to monitor ALL activity surrounding that data-not just changes to it. In the world of databases, this means auditing all SELECT statements-something many native database auditing tools are not very good at. This presentation will demonstrate how you can log this activity across multiple database platforms (without bringing your database to its knees), and then what to look for in those reams of log entries your auditors made you record.

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Kimber Spradin and Dale Brocklehurst: Auditing Data Access Without Bringing Your Database To Its Knees

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference

Play Episode Listen Later Jun 4, 2006 63:50


Today’s privacy requirements place significant additional auditing burdens on databases. First you have to know which databases in your environment contain regulated Personally Identifiable Information (PII) or Protected Health Information (PHI), then you have to monitor ALL activity surrounding that data-not just changes to it. In the world of databases, this means auditing all SELECT statements-something many native database auditing tools are not very good at. This presentation will demonstrate how you can log this activity across multiple database platforms (without bringing your database to its knees), and then what to look for in those reams of log entries your auditors made you record.