The Six Principles of Data Protection: Facebook fails

Facebook may believe that dubious data collection and security practices justify a more connected audience: the incoming General Data Protection Regulations say differently. Once again, data privacy is in the headlines. But this time, it isn’t a credit agency or department store that has fallen short of consumer expectations: instead, it’s Facebook. Much credit is…

Read More

Google prepares for the first “Right to Be Forgotten” trials in England

All human beings have three lives: public, private, and secret. ― Gabriel García Márquez The European Union’s Court of Justice decision in Google Spain v Agencia Española de Protección de Datos, Mario Costeja González (“Google Spain”) confirmed the “right to be forgotten” for European citizens. This right is further enshrined in the upcoming General Data Protection Regulations (GDPR). Accordingly, European data protection…

Read More

Silent Witness: silent on data protection officers

Silent Witness is a BBC crime drama about a team of forensic pathology experts and their investigations into various crimes – it’s a bit like American hit shows Bones and Law & Order. In a recent episode, a cyber hacker steals the files of 30,000 patients from a hospital, and then extorts the hospital for…

Read More

A Soundtrack for Data Security

So much of the explosion in innovation in the music industry is around technological processes. But artists still need to focus on their art. To do so, they need to surround themselves with tech-savvy people. And hire a good lawyer. – Gigi Johnson, Director of the Center for Music Innovation, University of California Los Angeles Privacy…

Read More

Cyber security gets Hollywood makeover

Hacking is a major issue for many industries – but Hollywood is an especially tempting target. The new Entertainment Security Operations Center in Los Angeles hopes to provide a secure system for studios to control their valuable creative content. HBO, Sony Pictures, and Netflix have all been hacked in major security breaches. In addition to…

Read More