Click to learn more about author Cathy Nolan. I was recently reminded of a game we used to play during particularly boring meetings and presentations called Buzzword Bingo. Several people claimed to have invented the game and it was very popular for a period of time when buzzwords were fairly new to Data Management and it […]
Your Personal Data is Up for Grabs: New Patents & New Scams Compromise Data Privacy
Click to learn more about author Cathy Nolan. How many ways can our privacy be compromised? Recent patents and news articles can make us crazy thinking about how our privacy is being invaded both at work and in our homes. First it was Amazon’s Echo and KitchenAid’s refrigerators recording what we said and transmitting it so […]
Google Me, Google You: Data Privacy and Data Gathering
Click to learn more about author Cathy Nolan. Who hasn’t Googled their name at one time or another? It can be affirming, as in “Wow, they know I gave a presentation at a conference”, or scary as in “Wow, they know I have a police record!” Yes, there isn’t much they don’t know, and it’s not […]
Data Surveillance, Monitoring, and Spying: Personal Privacy in a Data-Gathering World
Click to learn more about author Cathy Nolan. Americans have long been divided in their views about the trade-off between security needs and personal privacy including data privacy. Much of the attention has been on how government collects data or uses surveillance, though there are also significant concerns about how businesses use data. When a terrorist […]
Killing Anonymity: The Question of Data Privacy
Click to learn more about author Cathy Nolan. Maybe we should ask, “who or what killed anonymity?” The question being debated over and over again is “have we given away our privacy for convenience and security?” It would appear that the answer is “yes”. Some of our privacy we give away without even knowing it, but […]
Privacy Impact Assessments: Why and When to Do Them
Click to learn more about author Cathy Nolan. What is a Privacy Impact Assessment? A Privacy Impact Assessment, or PIA, is an analysis of how personally identifiable information (PII) is collected, used, shared, and maintained. Why do it? If your organization needs to comply with the GDPR, a PIA will demonstrate that program managers and system […]
A Balancing Act: Law Enforcement Cameras vs Data Privacy
Click to learn more about author Cathy Nolan. You’ve all seen it on TV – detectives and their teams trace a suspect by using video and cellphone cameras, social media, DNA analysis, fingerprint and facial recognition databases, telephone conversations, cameras mounted on police vehicles, and tracking devices on Smartphones and GPS. How accurate are these devices […]
Who is Using Your Identity? Data Theft and Data Security are Legitimate Concerns
Click to learn more about author Cathy Nolan. Identity theft is a two-step process. First, someone steals your personal information or corporate data, which is bad enough, but then the thief uses that information to impersonate you and commit fraud. If someone steals your identity it can create substantial financial risk and be extremely frustrating because […]
Using the Internet of Things to Track Shoppers
Click to learn more about author Cathy Nolan. No longer content to use passive methods that track the number of people who enter their stores, brick-and-mortar retailers are now using software that allows them to watch customers as they shop, and more importantly, gather data about their behavior. Under the guise of making shopping more enjoyable, […]
Data Security and Protection of Emails
Click here to learn more about author Cathy Nolan. No one can deny that email and email hacking was at the center of our recent Presidential election. If nothing else, the American public learned that putting personal information in emails is not much safer than posting it on one of the numerous social media sites. […]