Call Us:+1-323-813-5979

Category Archives : Data Privacy

Home  /  Data Privacy

28.May, 2020 0

Five US states that define data breach to include access

With the increasing incidences of consumer data breaches, entreaties for stronger data privacy protections and regulations have grown stronger. As per the US federal government’s reluctance to salvage the situation, many of the 50 US state governments appear to have taken the bull by its horn. These states’ have, through…

26.May, 2020 0

Relation of intermediary liability to data breaches

Intermediary liability refers to the legal culpability of internet intermediaries in respect of the illegitimate, illegal, or harmful activities carried out by their users. For such culpability to arise, such user(s) must have performed such illegitimate activity(ies) through the intermediary’s offered service. The responsibility thus devolves on intermediaries such as…

21.May, 2020 0

Building a good data protection program for your Business (Part 2)

Taking On-site security measure: Soon after the risks to data are collated, the next line of action would be to take appropriate physical data protection and damage measures. That can be achieved by making use of commercial record centers to store confidential hard copy documents and files. Such facilities keep…

19.May, 2020 0

Building a good data protection program for your Business (Part 1)

As governments around the world each race to put together updated data protection and privacy regulation frameworks that secures the interests of their citizens, one thing is for sure – businesses have no choice but to comply.  However, many businesses out there have developed cold feet, perhaps because the word…

14.May, 2020 0

Operationalizing data protection for business (Part 2)

Defining privacy policies and procedures: Amongst other things, most of today’s data privacy and protection laws and statutes require many businesses to update or create more privacy policies, in addition to the implementation of several privacy procedures. Data-centric businesses may thus have to, in operationalizing best data protection practices, create…

12.May, 2020 0

Operationalizing data protection for business (Part 1)

In today’s world, amongst humans, data shares a good-like characteristic: omnipresence. And as people become more conscious about how their data is dealt with, the need for concrete data protection and privacy frameworks that regulate corporate operations continue to grow. Nowadays, there is an irresistible need for operationalizing data protection…

7.May, 2020 0

What is considered personal Identifiable Information under privacy laws?

Under privacy laws, personal Identifiable Information (PII) refers to information capable of being solely used, or combined with others, to identify, locate, or contact an individual. The United States’ National Institute of Standards and Technology (NIST)’s Guide to Protecting the Confidentiality of Personally Identifiable Information defines PII as “information such…

16.Apr, 2020 0

Is Data Encryption More Secure or Less Secure?

In today’s world, almost nothing is secured. Everything you can think of, such as our lives, properties, and belongings, all need one form of security or the other. Even our digital properties/data – that are free from physical dangers – are not safe. This is where data encryption comes in….

14.Apr, 2020 0

Are Data Protection Officers Personally Liable for Data Breaches?

Under the European Union’s General Data Protection Regulation (GDPR), corporations are obligated to appoint DPOs – Data Protection Officers. These officers are, amongst other things, obligated to counsel their organization about GDPR regulatory best practices, and monitor internal compliance with GDPR rules. Importantly, they also function as contact points between…

9.Apr, 2020 0

How Patients’ Health Data are Protected (Part 2)

In the first part of this blog, we beamed our searchlight on the need for patient health data protection. We mentioned the proliferation of data encryption as a foremost measure for protecting sensitive health data. In this blog, we shall be examining other PHI protection measures, to wit: Data Protection…