This Week in Data Privacy
Jodi Daniels
Practical Privacy Advisor / Fractional Privacy Officer / WSJ Best Selling Author / Keynote Speaker
This Week in Data Privacy, we will be touching on a number of interesting developments in the world of privacy, but first, we want to take a moment to welcome the newest addition to the Red Clover Advisors team!
Emma Banze is now joining us as our Privacy Program Manager and will be bringing her consulting experience as well as legal operations experience to Red Clover Advisors, and we can not wait to see her in action!
Thank you for joining our team!
Now, let's jump into some privacy news.
First up, I want to share my latest Forbes publication, The Convergence Of Data Privacy And Digital Trust, which explains how building trust about your handling of consumer data can differentiate your organization from the competition.
In addition, we're discussing Iowa finalizing a new state privacy law, AT&T confirming a data breach that exposed 9 million customer accounts, as well as tips for how to plan for data privacy in business acquisitions.
Make sure you never miss an issue by clicking the "Subscribe" button in the upper right corner of the page!
The Convergence Of Data Privacy And Digital Trust
Unfortunately, the devices we use are often not designed with data privacy in mind. But without the careful application of privacy strategies and practices, businesses can quickly erode digital trust between their business and consumers.
Digital Trust is the confidence a consumer or employee has in an organization’s protection and privacy of their data
Having consumer trust is important, but as data breaches accelerate in severity and frequency, digital trust is a delicate commodity. And the cost of losing trust can be sizable. Luckily, the commodity of digital trust can be protected.
In a highly competitive digital ecosystem, companies must maintain trust with their consumers—and prioritizing privacy is one of the best ways to do so.
So, how is digital trust is built? From numerous actions businesses take over time. For example:
Plan collaboratively: Privacy programs shouldn’t exist in a silo. You need?
Recognize that privacy regulations don’t equal digital trust: Instead of solely relying on legislative requirements to guide your privacy program, consider implementing a privacy-by-design framework (PBD).
PBD is based on a proactive, transparent and user-centered approach that makes privacy the default setting for businesses. As a result, your business defaults to processes and practices that promote digital trust rather than ones that aim for the bare minimum.
Train your staff on privacy best practices: Training your entire staff is essential to building trust with consumers. The greater knowledge everyone on your team has about privacy policies, the more effective your privacy efforts will be.
Share your good privacy work: Building trust of any kind requires communication. Are you telling your customers what steps you’re taking to protect their personal information? If so, they might not be aware that they can trust you.
There are lots of opportunities to spread the good word about your good privacy work—don’t overlook them.
Align trust and privacy with the right strategies: Digital trust isn't something that's built overnight. It may seem like a big undertaking, but with the right steps, you can position your company as one your customers will feel confident in trusting.
Read the full article here: https://www-forbes-com.cdn.ampproject.org/c/s/www.forbes.com/sites/forbesbusinesscouncil/2023/03/17/the-convergence-of-data-privacy-and-digital-trust/amp/
Iowa set to finalize sixth US comprehensive state privacy law
Iowa is set to become the sixth state to pass comprehensive legislation after a unanimous vote to approve Senate File 262. The bill is set to take force Jan. 1, 2025.
Covered entities under SF 262 must:?
The bill offers:?
Missing are:
领英推荐
"This bill represents a wish list of industry-sought provisions, which is to say that it pretty much affirms the status quo by offloading all the responsibility for privacy protection onto the individual with almost no substantive limitations on how companies collect or process data," said Consumer Reports Policy Analyst Matthew Schwartz .?
Read the full article from IAPP here: https://iapp.org/news/a/iowa-set-to-finalize-sixth-us-comprehensive-state-privacy-law/
AT&T Confirms Third-Party Data Breach Exposing 9 Million Customer Accounts
AT&T exposed 9 million customer records in a third-party data breach. AT&T said the breach exposed Customer Proprietary Network Information (CPNI) such as the number of lines or subscribed wireless plan. This information is highly regulated by U.S. federal laws.
AT&T said the third-party data breach exposed:
Some wireless accounts also leaked the rate plan name, past due amount, monthly payment amount, monthly charges, or minutes used.
Thankfully the third-party data breach did not expose “credit card information, Social Security Number, account passwords or other sensitive personal information.”
Telecommunications companies have always been a lucrative target for financially-motivated hackers and state-sponsored threat actors.
The American government considers telecommunication companies crucial elements of the nation’s critical infrastructure, whose disruption would seriously impact the economy and national security.
Read the full article by CPO magazine here: https://www.cpomagazine.com/cyber-security/att-confirms-third-party-data-breach-exposing-9-million-customer-accounts/
How to Plan for Data Privacy in Business Acquisitions
In business, data can be an asset or a liability—and many times it can be both. For those interested in buying a business, data privacy considerations have changed in the past few years
Buyers interested in business acquisitions have to know what they could potentially be taking on in terms of opportunities or risk.?
Before you sign on the dotted line, weigh the following considerations when it comes to potential acquisition, privacy concerns, and protecting your interests.?Here are some privacy-related issues to include in your audit.
How data is collected
What data is collected
How data is stored
Who else has access to the collected data?
Current compliance procedures?
Security and history of data protection
The prospect of buying a business is exciting and can be incredibly rewarding. When it comes to acquisitions, knowledge is power. The more you know about a business, the more effectively you can hit the ground running.
For more on all the considerations and information to gather to avoid unexpected data governance liabilities read the full RCA article here: https://redcloveradvisors.com/2023/03/21/how-to-plan-for-data-privacy-in-business-acquisitions/