Remove Consumer Protection Remove Data collection Remove IoT
article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

“I would say that you’re talking about state data breach laws, state and federal laws against unfair and deceptive trade practices, [and] potentially HIPAA liability for health institutions that were relying on a system that was using inadequate security protocols,” Davisson continued. “If This is a design failure,” agreed Kulkarni. “It

article thumbnail

Data Privacy Week 2023: Privacy Gains Power From Other Societal Forces

Security Boulevard

In 2023, the larger implications of privacy — including the ethics of using artificial intelligence (AI) and biometrics, the management of consumer-to-business relationships, and public issues such as consumer protection — will become much clearer through regulatory and legal action.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Holiday Shopping Readiness: How is Retail Data Security Holding Up?

Thales Cloud Protection & Licensing

Vendors’ attention is increasingly fragmented across various data-collecting and transactional platforms. As if things were not difficult enough, data collection in more states and countries is becoming stricter, with increased consumer protection laws leaving retailers applying tighter data privacy to their digital platforms.

Retail 71
article thumbnail

Holiday Shopping Readiness: How is Retail Data Security Holding Up?

Security Boulevard

Vendors’ attention is increasingly fragmented across various data-collecting and transactional platforms. As if things were not difficult enough, data collection in more states and countries is becoming stricter, with increased consumer protection laws leaving retailers applying tighter data privacy to their digital platforms.

Retail 64
article thumbnail

Survey Says…Cybersecurity Remains A Critical Challenge For Business

Privacy and Cybersecurity Law

34% assess device and system interconnectivity and vulnerability across the business ecosystem.