Author

Theo Ling

Browsing

The monitoring of employees is a poignant example of an activity that requires a balance between the interests of different parties. On the one hand, organizations have a legitimate interest in safeguarding their information. Organizations can invest a significant amount of time and resources securing valuable data from external threats, only to have these efforts thwarted by the careless or intentional actions of an employee. Indeed, a study found that 29 percent of data breaches…

As we noted in the first post of our accountability series, the principle of accountability has become a global privacy paradigm. In this post, we discuss the evolution of this principle and how it got to be where it is today.Accountability In The Early DaysThe accountability principle has featured in international data protection instruments for 35 years making its debut in 1980 when it was included in the original OECD Guidelines. It was taken-up 25…

Social media is an essential tool for businesses to drive and retain business, build their brand, and establish their market presence. As consumers and businesses alike become increasingly mobile, the volume of information produced and consumed electronically, and the risk of keeping the information secure, both increase exponentially.Technavio—a global market research company—estimates that information governance (IG) in the social business market is growing at a compound annual growth rate (CAGR) of over 12% and will…

Once confined to scientific research and criminal investigations, biometric data is now frequently used in everyday scenarios like building access controls, mobile devices and airport security checks. It is hailed for enhancing security but it is also feared for invading privacy. In this post, you will learn five basics you should know about biometrics. Click here for the introduction to our Biometrics Series.1. What Is Biometric Data?Biometric data is data about an individual’s physiological or…

We live in a world of information overload. Rapid advances in technology allow for the quick creation and distribution of information. Consider the amount of time lost to managing email, where a large amount of information has no business value, but losing track of a single critical email can have serious consequences. Effectively finding and securing the right data can be a difficult task amidst this extraordinarily productive environment. To avoid data disaster, today’s Chief…

– Peter Woollacott, Head of Huntsman, a global cyber-security firmThe modern company is undoubtedly going through a transformative period. As recently as 10 years ago, the idea that a company could have some of its most valuable property stolen, and not notice or act for days after the fact, would have seemed unfathomable. Today, data breaches such as these are not only happening, but becoming commonplace.The rise of this nightmarish threat can be attributed to…

The Accountability Principle in International Data Protection InstrumentsPrivacy Accountability: National Regulators’ Accountability Guidance (Part 1)Privacy Accountability: National Regulators’ Accountability Guidance (Part 2)Colombian Data Protection Authority issues Accountability Guidance The notion of accountability is not new to data protection law and policy. What is new, though, is that it is becoming more and more relevant in practice and is on its way to becoming one of the most important data protection principles on a global scale.Long gone…

Information is power…but it also creates organizational riskInformation is an increasingly valuable business asset. It is a resource that can help empower a business, allow it to uncover new opportunities and develop a competitive edge. For example, many online businesses routinely sift through massive amounts of data collected from users for insights into how they can better target potential customers.Along with these new opportunities, however, come various risks and responsibilities related to the collection, use,…

The use of biometric technology is on the increase and so is, inevitably, the collection and use of biometric data, such as fingerprints, DNA, facial images and typing rhythm. As biometric data relates to an individual’s physiological or behavioural traits which allow unique identification, it can be highly sensitive and its increased collection and use raise serious concerns amongst privacy advocates. The recent announcement from the U.S. Office of Personnel Management that fingerprint data of…

We live in a big data world, and because of that, companies are mired in a slew of information governance compliance issues. In a perfect word, there would be turn-key solutions. But each company is unique, has its own compliance standards, runs different systems, and operates in specific markets and industries. So how is a company supposed to manage its information governance risks and obligations in our big data world? See what we have to offer…