GDPR

Our contradictory relationship to data privacy

For some time now, governments have been blurring the lines between privacy and national security. In 2013, ex-CIA systems analyst Edward Snowden revealed that the NSA, a US intelligence agency, was collecting the phone records of tens of millions of Americans. As Snowden’s leaks continued, it soon transpired that as part of its Prism surveillance programme,…


For some time now, governments have been blurring the lines between privacy and national security. In 2013, ex-CIA systems analyst Edward Snowden revealed that the NSA, a US intelligence agency, was collecting the phone records of tens of millions of Americans. 

As Snowden’s leaks continued, it soon transpired that as part of its Prism surveillance programme, the NSA was tapping directly into the servers of nine internet firms including Facebook, Microsoft and Google to gather intelligence on Americans’ behaviour and interactions. What’s more, Snowden further revealed that the UK’s intelligence organisation, GCHQ, was also using Prism to gather similar information and was able to monitor up to 600 million communication a day.

Since then, the abuse and misuse of communications data are believed to have been instrumental in affecting the outcome of both the 2016 US presidential election and the Vote Leave Brexit campaign, and have been an important contributory factor in establishing stringent data privacy legislation such as GDPR. 

All of this is public knowledge. But despite the extensive column inches these stories have received, most have yet to change our habits, continuing to carry at least one device capable of listening to our conversations, broadcasting our exact locations, and tracking us as we move. And many of us willingly allow them to do so in trade-off for the convenience and benefits they offer. So just how concerned are we about the use and abuse of our personal data? 

  • Data Protection Day 2019: Privacy firmly in the limelight
  • How smart devices are leaving consumer privacy vulnerable
  • Is privacy the new customer experience grail?

Privacy, GDPR. General Data Protection Regulation. Cyber security and privacy concept. Wooden letters on the office desk, informative and communication background - Image

Image Credit: Shutterstock

(Image: © Image Credit: Shutterstock)

Signing away our privacy

Earlier this year, we conducted a survey of 4,000 consumers across the globe to measure their confidence in their own privacy and security practices, as well as those of businesses. The report, ’

Read More

Be the first to write a comment.

Leave a Reply

GDPR

Marriott owner facing huge GDPR breach fine

The owner of the Marriott hotel chain is set to face a £99m fine following a data breach that left thousand of customer details exposed.The fine from the UK’s Information Commissioner’s Office (ICO) comes after the personal data of approximately 339 million guest records globally were breachedd following a cyberattack.Amazon Prime Day deals: see all…


The owner of the Marriott hotel chain is set to face a £99m fine following a data breach that left thousand of customer details exposed.

The fine from the UK’s Information Commissioner’s Office (ICO) comes after the personal data of approximately 339 million guest records globally were breachedd following a cyberattack.

Amazon Prime Day deals: see all the best early offers right here.

The breach was referred to the ICO by Marriott in November 2018 as around 30 million of those customers affected were residents of 31 countries in the European Economic Area (EEA) – and seven million related

Read More

Continue Reading
GDPR

Predicting the Future of Internet Privacy

About the authorBrett Dunst is the vice president of corporate communications at DreamHost.Every day, a new headline reminds us that keeping our online data private remains a constant struggle. Ongoing controversies involving Facebook and other social media sites only reinforce the point. It’s become depressingly common to hear of security breaches involving organizations who have…


About the author

Brett Dunst is the vice president of corporate communications at DreamHost.

Every day, a new headline reminds us that keeping our online data private remains a constant struggle. Ongoing controversies involving Facebook and other social media sites only reinforce the point. It’s become depressingly common to hear of security breaches involving organizations who have been given access to our personal data—organizations that we’ve often never even heard of before!

How did we get here? History shows that we’ve come a long way in a short time, and reminds us that we don’t lack for founding principles. History also reminds us that our attitudes toward online privacy and the ways we attempt to control it have evolved. So, where is the next evolution going to take us? We have some ideas.

Amazon Prime Day deals: see all the best early offers right here.

1) Encryption Will Become the New Normal

Encryption is an admittedly big tent. It encompasses everything from the hashing that safeguards passwords to the algorithms that guarantee the authenticity of digital signatures. Whatever form it takes, however, encryption represents the tech industry’s attempt to address the various issues clustering aro

Read More

Continue Reading
GDPR

UAE data protection law, similar to GDPR, likely landing this year

The UAE is looking at implementing a data protection law, similar to EU’s introduction of General Data Protection Regulation (GDPR) in 2008, as part of the UAE National Cybersecurity Strategy.TRA has launched the 2020-2025 strategy as the country is entering the fifth-generation era in a bid to enable swift and coordinated response to cyber incidents…


The UAE is looking at implementing a data protection law, similar to EU’s introduction of General Data Protection Regulation (GDPR) in 2008, as part of the UAE National Cybersecurity Strategy.

TRA has launched the 2020-2025 strategy as the country is entering the fifth-generation era in a bid to enable swift and coordinated response to cyber incidents in the UAE.  “Part of the strategy is that data privacy is crucial to the cyber and the UAE is regulating and drafting a data protection law. We will look at the best performing practices performed worldwide; GDPR will be one of the inputs to it. We want to make sure that whatever regulations are put, are easy to be implemented across different sectors,” Mohammad Al Zarooni, Director of Policies and Programs Department at Telecommunications Regulatory Authority (TRA) of the UAE,told TechRadar Middle East, at an event.

Read More

Continue Reading
GDPR

Security is now a board level issue: how to secure the data supply chain

It has never been more crucial for businesses to implement and demonstrate their commitment to cybersecurity; with data increasingly being used to make significant business decisions. While historically, the major concerns for senior management around IT security have focused on intellectual property theft and reputational risk, ongoing changes in technology and politics have changed today’s business…


It has never been more crucial for businesses to implement and demonstrate their commitment to cybersecurity; with data increasingly being used to make significant business decisions. 

While historically, the major concerns for senior management around IT security have focused on intellectual property theft and reputational risk, ongoing changes in technology and politics have changed today’s business landscape and priorities significantly. With GDPR now in full force, organisations must demonstrate to stakeholders that they are making a credible effort to ensure that security is built into the heart of business operations. 

IT security budgets are falling

  • Half of organizations lack the security talent needed to remain secure
  • Empowering CISOs to strengthen password security
  • Vulnerabilities in the data supply chain

    Organisations must first understand what potential vulnerabilities look like within a data supply chain, so they can be recognised and mitigated. As cyberattacks increase in sophistication, they are likely to be so subtle that they don’t visibly impact a system; providing misleading information to force erroneous decisions. Ironically, whilst this type of attack will be very difficult to detect, early identification is vital in order to prevent significant damage.

    The first

    Read More

    Continue Reading