Category Archives: Privacy Rights

Why the Apple-FBI Feud Affects YOU!

While the eyes of everyone in the technology sector watched the Apple-FBI feud about a key to unlock a terrorist’s iPhone, you should have been watching too. You might wonder why this situation affected you, and the reason is simple. … Continue reading

Posted in data protection, Data Security, Mobile Computing, Online Privacy, Online Security, Privacy Rights, Tech Equipment, Terms of Service | Leave a comment

Don’t Forget Security When Developing Corporate Mobile Apps – Time for Another Look

About a year ago, I wrote a post about the importance of security when developing mobile device apps. As part of the post, I also discussed the importance of security when evaluating the “bring your own device” to work (BYOD) … Continue reading

Posted in BYOD, Data Breach, Data Security, Internet of Things, MSP, Privacy Rights | Tagged , , , , | Leave a comment

Is Privacy More Important to the Media, Businesses or Consumers?

There is no denying that businesses need to be more diligent in protecting their customers’ data, but with all the data breaches publicized in the mainstream media, who cares more about privacy? What do you think: businesses or consumers? Despite … Continue reading

Posted in Data Breach, Data Security, Management and Technology, Privacy Rights | Tagged , , , | Leave a comment

What Can Your Business Learn about #Privacy from the UK Direct Marketing Association?

It seems as if a day doesn’t go by without notification by the media of a major data breach. If you’re a member of the C-Suite of a midsize business, you probably spend a good deal of time thinking about … Continue reading

Posted in Data Breach, Data Security, Management and Technology, Privacy Rights | Tagged , , , , | Leave a comment

Want a Competitive Advantage? Then Protect Your Customers’ Privacy

It seems as if we hear about a major data breach every day, whether it’s a government entity, hospital or other medical institution, or a large retail outlet. Whether the breach occurs due to malware or a lack of external … Continue reading

Posted in Business Process, Data Security, Online Privacy, Privacy Rights | Tagged , , , | Leave a comment

Do Your Customers Want to Be Tracked?

A major entertainment company recently made news when it announced a new tool available at its theme parks. Under the guise of making visits more “fun and easy,” theme park guests are now able to wear a type of bracelet … Continue reading

Posted in Bluetooth Technology, Cybersecurity, Data Security, Mobile Computing, Privacy Rights, Tech Equipment | Tagged , , , , , | 1 Comment

Drones: The Next Great Hack

As a kid, one of my favorite hobbies was flying radio control airplanes. Back in the day, we used to hang a colored flag off our antennas to notify other hobbyists what frequency we were on. If someone nearby had … Continue reading

Posted in Data Security, Internet of Things, Privacy Rights, Tech Equipment | Tagged , , | Leave a comment

What Policies Appear On Your Website?

Like many businesses, you probably maintain Facebook, Twitter, YouTube, and LinkedIn accounts to promote your product or service. If your leadership and IT teams listen to your marketing and PR teams, these social sites link back to your main website. … Continue reading

Posted in Online Privacy, Online Security, Privacy Rights, Terms of Service | Tagged , , | Leave a comment

Privacy vs. Security

It seems as if everyone is talking about privacy – or wait, is it security? First there was the WikiLeaks data leak by Julian Assange; then there was the NSA data leak by Edward Snowden which brought to light the … Continue reading

Posted in Cybersecurity, Data Security, Network Security, Online Privacy, Online Security, Privacy Rights | Tagged | Leave a comment

Does Your Business Conduct Undercover Reconnaissance on Your Customers?

Last year, there was a story in the news that an international airline would conduct Google searches on its passengers in an effort to create customized experiences for its repeat travelers. The head of customer analysis of British Airways explained … Continue reading

Posted in Business Process, Data Security, Network Security, Online Privacy, Online Security, Privacy Rights, Social Media | Leave a comment