
I got the opportunity to write a post that was published in the IAPP News blog — then found out they decided to feature it in their widely read Daily Dashboard. A good day for UMA visibility! If you like, you can also RT one (or both :-) of their tweets… https://twitter.com/dailydashboard/status/621195250799783936 <https://twitter.com/dailydashboard/status/621195250799783936> https://twitter.com/dailydashboard/status/621013389914021889 <https://twitter.com/dailydashboard/status/621013389914021889>
Begin forwarded message:
From: "IAPP Daily Dashboard" <publications@iapp-email.com <mailto:publications@iapp-email.com>> Subject: A New Model for Consent Date: 14 July 2015 at 6:44:48 PM GMT+1 To: <eve@xmlgrrl.com <mailto:eve@xmlgrrl.com>> Reply-To: "IAPP Daily Dashboard" <reply-fe9115747360017577-1775_HTML-5175062-7000677-0@iapp-email.com <mailto:reply-fe9115747360017577-1775_HTML-5175062-7000677-0@iapp-email.com>>
To view this e-mail as a web page, go here. <http://click.iapp-email.com/?qs=605a6ac0ec6aadb9c3f840221f37c48400044ca06b755bddc7a37e8159a8ba11> <http://click.iapp-email.com/?qs=605a6ac0ec6aadb997fdb8c6cdc3df69f64363707602d058f671af0101b98537> <http://click.iapp-email.com/?qs=605a6ac0ec6aadb995a51ec9a26bc8c318596b0f0e503181e894ecc709394494> <> Build your privacy skills TRAIN IN SAN FRANCISCO Just announced! Registration is now open for privacy training classes headed to San Francisco. Your class includes everything you need to get started. And if you decide to aim for a credential, you'll have a head start. October 14-15
Register Now <http://click.iapp-email.com/?qs=605a6ac0ec6aadb98548e42ca90849f77913cfdf1f2a3672426fd0af39afbf66> INTERNET OF THINGS A New Model for Consent With the traditional consent model under threat from the rise of Internet-of-Things (IoT) technology, there may be new and viable consent tools that provide users with control over how their personal data is shared. "A new wave of companies developed two new kinds of consent tools to meet the needs of emerging data-sharing requirements—OAuth and the 'Share' button—and go beyond the minimums required by certain regulators," writes ForgeRock Innovation and Emerging Technology VP Eve Maler in this post for Privacy Tech. Maler delves into these alternative models to demonstrate the potential for real-world practical application for users and businesses in the IoT economy. Full Story <http://click.iapp-email.com/?qs=605a6ac0ec6aadb94fe1214d53be88d91cd8ef03baa67bae4b053be7e2e9cd6b> PRIVACY BUSINESS Start-Up Launches Campaign To Boost Two-Factor Authentication In June, mobile identity company TeleSign commissioned a study on consumers' concerns about online security and their exposure to breaches. It found that, amidst increasing breach reports, 80 percent of consumers are worried about their online security and 40 percent have experienced a security incident within the past year. It also found, however, that 73 percent of online accounts use duplicated passwords and more than half of consumers use five or fewer passwords across their entire online life. Given statistics like those, TeleSign has launched a campaign aimed at educating consumers on what it says is the future of mobile identity: two-factor authentication. In this exclusive for The Privacy Advisor, Angelique Carson, CIPP/US, talks to TeleSign CPO Stephen Bolinger, CIPP/E, CIPP/G, CIPP/US, CIPM, about the initiative. Full Story <http://click.iapp-email.com/?qs=605a6ac0ec6aadb9f31a121a3a0799b672de6f1d142101102cbb1f074c9bed9e> PRIVACY LAW—EU Unraveling the Mysteries of the Trilogue The trilogue process for the proposed EU General Data Protection Regulation continues this week with the co-legislative bodies of the EU—the Commission, the Parliament and the Council—meeting to discuss Article 3 on the territorial scope of the regulation and Chapter 5 on international data transfers. Still hazy on how the trilogue works? Olivier Proust, CIPP/E, of counsel at Fieldfisher, explains it all in layman's terms in this post for Privacy Tracker. (IAPP member login required.) Full Story <http://click.iapp-email.com/?qs=605a6ac0ec6aadb95366ec92db0bbf227494beabfa8b3ec16fd4974aee9f46bd> Advertisement
Case Study: The Business Associate's Guide to Breach Response Data breaches affect all types and sizes of healthcare organizations. Managing a caring, compliant breach response is no easy feat-especially for business associates with multiple covered entity clients. Here's a scenario of a breach, which affected approximately 338,000 California residents and involved multiple covered-entity clients, and the resulting best practices learned that can help business associates navigate the complexities of such a breach and launch a successful response.
Read About These Eight Steps <http://click.iapp-email.com/?qs=605a6ac0ec6aadb9250d78dcafd5a18fd361442e07316596eb7220fcfcafcaaa> CYBERSECURITY—U.S. DHS Secretary: Federal Cybersecurity Needs Improvement In a column for POLITICO, Department of Homeland Security (DHS) Secretary Jeh Johnson updates the public on the current state of cybersecurity efforts within the federal government, noting while much is being done to bolster the nation's cyber framework, more is needed. Johnson writes that information sharing is "fundamental to cybersecurity" and calls on Congress to "expressly authorize the EINSTEIN program" and "eliminate any remaining legal obstacles to its deployment across the federal government." Johnson notes that, "we must incentivize the private sector to share cyber-threat indicators with the federal government ... in a manner that protects privacy and provides protection from civil and criminal liability" and highlights the need for a national breach reporting system and "enhanced criminal penalties for cybercrime." Full Story <http://click.iapp-email.com/?qs=605a6ac0ec6aadb96b6a8ed26f2aaf284f4233a26e9d401824e6b605d85aa861> PRIVACY—CANADA Video: Frank Work on Deconstructing Privacy Former Alberta Information and Privacy Commissioner Frank Work spoke in his keynote address at the IAPP 2015 Canada Privacy Symposium about the past 35 years of privacy and its evolution. In this IAPP video from his talk, Work, who is now a privacy consultant, tells attendees at this year's Symposium that while he is not going to declare privacy is dead, "I would like to leave you with an understanding of the social forces that I think shape any current view of privacy." Full Story <http://click.iapp-email.com/?qs=605a6ac0ec6aadb90061a673066bf246a5d2ab86c04df932a3655ed455558073> PRIVACY ENFORCEMENT—U.S. Cooper: FTC Overreached in Nomi Case The Federal Trade Commission (FTC) case against Nomi Technologies is based on presumption and apples-to-oranges reasoning, George Mason University School of Law's James Cooper writes for The Hill. After Nomi failed to ensure that the tenets of its privacy policy and in-store marketing campaigns extended to its retailers, the FTC stepped in, using its "Policy Statement on Deception" (PSD) as its legislative rationalization, Cooper explains, writing, "Unfortunately ... the commission appears to assume away the PSD's strictures. It had zero evidence that the ability to opt out of Nomi's encrypted in-store tracking was important to consumers' decisions to frequent stores." Cooper questions, "How did the commission get around the facts? By presuming the materiality of Nomi's promise to provide an in-store opt-out." Full Story <http://click.iapp-email.com/?qs=605a6ac0ec6aadb980364505b250caf34cde3785124f4eee306cae281e9188ab> Advertisement
Incident Response Workbook: Prepare Your Incident Response Plan Today In today's age of shifting cyber risk and large data breaches, the consequences of a poor breach response have never been higher: Sales, company reputation, stock prices, job retention and customer loyalty all hang in the balance. Organizations that are prepared to successfully execute a data breach response plan are able to respond quickly and effectively to the inevitable cyber-breach event, minimizing errors and reducing costs along the way. This workbook <http://click.iapp-email.com/?qs=605a6ac0ec6aadb98a8338e708c45a362679b9db12a0a0a889c7cd7ed3f4a86f> will help you get started on a custom incident response plan by providing an outline and recommendations for planning a well-orchestrated response to a data breach that includes key considerations for breach preparation and notification.
Download the Incident Response Workbook <http://click.iapp-email.com/?qs=605a6ac0ec6aadb9ac2b8ec9b5179aed6deef868a7edf5d8534864ae05e87ffb> PRIVACY LAW—U.S. Recover Act Aims To Assist OPM Breach Victims Nine House Democrats have unveiled the Recover Act, a bill that would provide "lifetime identify-theft monitoring" for the millions of victims of the recent Office of Personnel Management (OPM) breaches, The Hill reports. "Much of the OPM data is lifetime and permanent background information that cannot be changed like a credit card number," said Rep. Eleanor Holmes Norton (D-DC), whose bill is a companion to one from Sen. Ben Cardin (D-MD). The bill has support from National Treasury Employees Union President Colleen Kelly, who said it "will go a long way toward protecting individuals from ID theft problems stemming from these devastating data breaches." Full Story <http://click.iapp-email.com/?qs=605a6ac0ec6aadb94f90261164928b0e72f438b5698b0ff8bada42eea6ce295d> SURVEILLANCE—U.S. Advocates Cynical as NTIA Drone Talks Approach On August 3, the National Telecommunication and Information Administration (NTIA) will meet with privacy groups in an effort to understand the regulatory privacy measures necessary for drones, PCWorld reports. This is the third iteration of talks of this nature, which thus far have ended without consensus and with privacy groups leaving frustrated. "Consumer and privacy groups don't have confidence in the process," said Center for Digital Democracy Executive Director Jeffrey Chester. "Protecting privacy from the use of drones requires a serious effort that the NTIA has so far failed to demonstrate." Editor's Note: Joseph Jerome, CIPP/US, recently wrote a piece for Privacy Perspectives <http://click.iapp-email.com/?qs=605a6ac0ec6aadb91a213a9edcdd84591b4360fe471e10be6e4e130c68c07482> on why privacy pros need to be engaged with drone regulations. Full Story <http://click.iapp-email.com/?qs=605a6ac0ec6aadb96f91ee85029101fe7c97778bf3e634c0929bbe46c5a69f4d> HEALTHCARE PRIVACY—U.S. DHHS Settles With Hospital Over HIPAA Violation After an information-sharing incident gone awry and a data breach, St. Elizabeth's Medical Center faces a $218,400 settlement with the Department of Health and Human Services (DHHS) for failing to comply with the Health Insurance Portability and Accountability Act (HIPAA), The Boston Globe reports. "Organizations must pay particular attention to HIPAA's requirements when using Internet-based document sharing applications," said DHHS Office for Civil Rights Director Jocelyn Samuels, adding, "In order to reduce potential risks ... all workforce members must follow all policies and procedures." A hospital spokesperson said, "St. Elizabeth's has taken steps to ensure this will not happen again." Full Story <http://click.iapp-email.com/?qs=605a6ac0ec6aadb934efc4d442f7617a20390e49ab7173d23df65e3e03a112b6> Advertisement
Available Now: Privacy Laws in Asia With its critical impact on the world economy and global trade, privacy legislation in Asia has been extremely active in the last several years. Get complimentary access to a recently released report, Privacy Laws in Asia <http://click.iapp-email.com/?qs=605a6ac0ec6aadb99e55e3ca11c324bce23627280df24ffe6a4e2a7dee9d2ba6>, written by Cynthia Rich of Morrison & Foerster LLP for Bloomberg BNA. The report provides detailed analysis of the commonalities and differences in the privacy and data security requirements in countries including Australia, India, Hong Kong and more.
Download Now <http://click.iapp-email.com/?qs=605a6ac0ec6aadb9d5e1af5b34a41dd82e4227971dcfd0d263bac432ba3dcfda> INFORMATION ACCESS—U.S. Poitras Suing Over Unanswered FOIA Requests Filmmaker Laura Poitras is suing the U.S. government after receiving no response to her Freedom of Information Act requests for documents pertaining to the government's targeting of Poitras at U.S. and foreign airports, The Intercept reports. Poitras was searched, interrogated and detained more than 50 times over six years. Officials seized her notebooks, laptop, cell phone and other personal items. "I'm filing this lawsuit because the government uses the U.S. border to bypass the rule of law," said Poitras in a statement. The filmmaker, who won an Oscar for Citizenfour, said she hopes the suit will also bring attention to those who are less well known but are also harassed at the border. Full Story <http://click.iapp-email.com/?qs=605a6ac0ec6aadb970fcc853c0573583d4de42882e57803cb81cf1ffc54fb3b0> <> <http://click.iapp-email.com/?qs=605a6ac0ec6aadb9ec4213c68eaf05f19ffc5f53cb2c1c05baf1a21174798eb6> All Current Job Listings <http://click.iapp-email.com/?qs=605a6ac0ec6aadb9ec4213c68eaf05f19ffc5f53cb2c1c05baf1a21174798eb6> <> NEW WEB CONFERENCE—MODERN ONLINE AUTHENTICIATION Thursday, July 16, 1 - 2:30 p.m. EDT Join us as experienced privacy and security professionals share new and better methods beyond the password. Learn the latest developments in authentication and identity management methods.
Register Now <http://click.iapp-email.com/?qs=605a6ac0ec6aadb92618ca958ca5b7cbe4173c224653e627e7dc0dfc147abefb> July 14, 2015 QUICK LINKS Career Central <x-msg://28/#job> IAPP Web Conferences <x-msg://28/#wc> Find Us on Twitter <http://click.iapp-email.com/?qs=605a6ac0ec6aadb99d4f904da51ad0d47a71d7c5a05b1aadddbadea91ee61c31> Resource Center <http://click.iapp-email.com/?qs=605a6ac0ec6aadb9d37bafa241fca2630e44b183f9d3c9af0c356653fc679034>
<http://click.iapp-email.com/?qs=605a6ac0ec6aadb971602b9ea73067530bf53f5a6d77409f947f5e818f422644>
<http://click.iapp-email.com/?qs=605a6ac0ec6aadb9b2533f8db351da6fe52cffc9afcd140b086e5f08e8dfef07>
<http://click.iapp-email.com/?qs=605a6ac0ec6aadb9e9f62d7de53442a553830d62f6a66761051c9c6e460dea85>
<http://click.iapp-email.com/?qs=605a6ac0ec6aadb970252fc8f70eac2bca32588d744989ecb972ce4b0380e2c4>
<http://click.iapp-email.com/?qs=605a6ac0ec6aadb933a289ee4aa80eed943b64aff62112ddb6ff324056f46d47>
<http://click.iapp-email.com/?qs=605a6ac0ec6aadb99e55e3ca11c324bce23627280df24ffe6a4e2a7dee9d2ba6>
<http://click.iapp-email.com/?qs=605a6ac0ec6aadb9deb4ec4cd96a881da3fdf435e6c817a663ee5ae733efb690>
PLATINUM PLUS MEMBERS » Accenture <http://click.iapp-email.com/?qs=605a6ac0ec6aadb9ec7e280dbc089e0bf3c31e7da9ad6b9c52cfaf31b2a2c3ca> » Booz Allen Hamilton <http://click.iapp-email.com/?qs=605a6ac0ec6aadb9fc8b84e14fe778602490cf648a69e82407ba2a0e205ef02c> » Capital One <http://click.iapp-email.com/?qs=605a6ac0ec6aadb9ad9b584afcbebb928369d24c109d2a2b4b26f0618ba6688b> » CVS Caremark <http://click.iapp-email.com/?qs=605a6ac0ec6aadb9b3b1883dc84697d85f2ce76a31d2ce782ee38d6c28e218c8> » Deloitte & Touche <http://click.iapp-email.com/?qs=605a6ac0ec6aadb9c17ff9657bec1335d2c9a9f827f300b5c902b1dcf5a17969> » Ernst & Young <http://click.iapp-email.com/?qs=605a6ac0ec6aadb919479d9ca2d9329df7d381a6ab5b4eb1e87939f9b75fabf2> » Google <http://click.iapp-email.com/?qs=605a6ac0ec6aadb908b17a2772a57a3e37bc7d76ee3b2f8e17a8e3c33e2657f3> » Hewlett-Packard Company <http://click.iapp-email.com/?qs=605a6ac0ec6aadb9dea02aa8aea11a1069a7108c16665796828cd52ee6bb5e8b> » Intel Corporation <http://click.iapp-email.com/?qs=605a6ac0ec6aadb97b84c17663b12559eda12b95304530cfba2fe2264a7d62fa> » KPMG LLP <http://click.iapp-email.com/?qs=605a6ac0ec6aadb9af6a4a1678d6bb99c146f7c5a4ab4d6f4d9608f8607a6abf> » Lockheed Martin Corporation <http://click.iapp-email.com/?qs=31418d6a32195a452bb17e84af6fcfe7c3f7e16c9c095022da903d93abcfa49b> » Merck & Co., Inc. <http://click.iapp-email.com/?qs=31418d6a32195a45be9094feef215f36ba17abe5644d004558d605f2a364a566> » Microsoft Corporation <http://click.iapp-email.com/?qs=31418d6a32195a45666de7d5d1adc12ec6f2cde52d2a92fd859631616c9e146b> » Oracle <http://click.iapp-email.com/?qs=31418d6a32195a45f3a8af5b9627044f705593cec2d486a7e9ef17e181b18573> » Pricewaterhouse Coopers LLP <http://click.iapp-email.com/?qs=31418d6a32195a45ca5e94186b041bb58f019cc267b9e174b0c143102505e978> » Promontory <http://click.iapp-email.com/?qs=31418d6a32195a45790bebb468c044fe5e537a6beb85c2d6e5b57631283f1432> » Teleperformance Group <http://click.iapp-email.com/?qs=31418d6a32195a45dde153352f7504ee90510e778a4fcbdbe429b0e6f4f94194> PLATINUM MEMBERS » American Express <http://click.iapp-email.com/?qs=31418d6a32195a455b5266ba184883310c0edb7f2a5c6cd5058fc5931c4e9db2> » AstraZeneca <http://click.iapp-email.com/?qs=31418d6a32195a4500586a331efa148ed5c9139d93af7aed2705154ee92b444a> » AT&T <http://click.iapp-email.com/?qs=31418d6a32195a456d7840fe9b14e68ee03698a8e1856361c8ca13cfc850770f> » AvePoint <http://click.iapp-email.com/?qs=31418d6a32195a4535a59ce41453effecfa3ea771d381cf4a77d53d8c33ef9c9> » Baker & McKenzie <http://click.iapp-email.com/?qs=31418d6a32195a456b10c8e9f7d466bce5b4d58af760d0c54e259c50c10fa90b> » Edelman <http://click.iapp-email.com/?qs=31418d6a32195a4581b4d0632b02d9ac468d67076a92f0293df50987b4e38787> » Facebook, Inc. <http://click.iapp-email.com/?qs=31418d6a32195a45a533a3bde0cdcac5ad2edcce1d7d02bdacc8f1f9f37cd65c> » The Nielsen Company <http://click.iapp-email.com/?qs=31418d6a32195a45744f28e88a398b6c74c219a6afa7ebc5571ba2dfefd236fb> » Ponemon Institute, LLC <http://click.iapp-email.com/?qs=31418d6a32195a45161732a7b036b1df1b76a82d9e8c7c8822ba68b7f249ed2e> » Reed Elsevier <http://click.iapp-email.com/?qs=31418d6a32195a45e82c6b75c734367606d7e9649d5f3b31aa18a19c41fd46ce> » Wal-Mart <http://click.iapp-email.com/?qs=31418d6a32195a45a50031a783e1cdabdfb2544f1794972897954f55f9db9481> GOLD MEMBERS » Amgen Inc. » Apple Inc. » Automatic Data Processing » Bank of America » Beijing Sogou Technology Development Co, Ltd » Citigroup » Hogan Lovells » Holland & Knight » Intuit » Jones Day » Kroll » McKesson Corporation » MetLife » Protiviti » Prudential » Staples, Inc. » Target » TD Bank » TRUSTe » UnitedHealth Group » Vodafone Group Services Limited » Yahoo! Inc.
SILVER MEMBERS <http://click.iapp-email.com/?qs=31418d6a32195a45b8b9fa1088946928e26c0bdc56bb647efc6618c8fb6ed5b9> CORPORATE MEMBERS <http://click.iapp-email.com/?qs=31418d6a32195a45b8b9fa1088946928e26c0bdc56bb647efc6618c8fb6ed5b9> Copyright© 2000–2015 International Association of Privacy Professionals. The views in this eNewsletter, if any, are those of the authors and are not necessarily those of the IAPP.
This email was sent to: eve@xmlgrrl.com <mailto:eve@xmlgrrl.com> This email was sent by: INTERNATIONAL ASSOCIATION OF PRIVACY PROFESSIONALS 75 Rochester Ave., Suite 4, Portsmouth, NH 03801 USA +1 603.427.9200 <http://click.iapp-email.com/?qs=31418d6a32195a455c65fdeb1af9428f7be52dfc3d5d61012b66fe91267a73fb> We respect your right to privacy - view our statement <http://click.iapp-email.com/?qs=31418d6a32195a4502dd0ffa1d5618447f3d5e417c66e4c37ff0495e45c20f5b> - view the ExactTarget statement <http://click.iapp-email.com/?qs=31418d6a32195a451fc7f2163a19a1b2c1000be5aa0ab2cdd4bda2c263950d4d> Manage Subscriptions <http://click.iapp-email.com/?qs=31418d6a32195a45bb9f937f73ade346dc4b1865d0f9540131fd21341b3cb7f9>
Update Profile <http://click.iapp-email.com/?qs=31418d6a32195a45066fde48c2eb4c717d03a7e7ddf8f2f0fcee545d89911d1b> | One-Click Unsubscribe <http://click.iapp-email.com/?qs=31418d6a32195a4569ef5a72d1e6e4c8742551e2394f319fd9c537790d5454d7>
Eve Maler | cell +1 425.345.6756 | Skype: xmlgrrl | Twitter: @xmlgrrl | Calendar: xmlgrrl@gmail.com <mailto:xmlgrrl@gmail.com>