Privacy Law
The Inefficiency of People-Search Removal Tools, Massive Data Breach Impacting U.S. Citizens
Tom Eston | | Confidently, Consumer Reports, Cyber Security, Cybersecurity, Data breach, Data Privacy, DeleteMe, Digital Privacy, EasyOptOuts, Episodes, Hackers, idx, Information Security, Infosec, Kanary, Optery, People Search, People-Search Removal Tool, Podcast, Podcasts, Privacy, Privacy Law, privacy laws, ReputationDefender, security, social security number, ssn, technology, US Privacy Law, Weekly Edition
In episode 342, we discuss the effectiveness of people-search removal tools like DeleteMe and Reputation Defender, based on a study by Consumer Reports. We also cover how almost every American’s social security ...
T-Mobile Hacker Identified, China’s New Privacy Law, Tesla Bot Announcement
Tom Eston | | AI, china, Cybersecurity, Data breach, Digital Privacy, Elon Musk, Episodes, Infosec, Podcast, Privacy, Privacy Law, security, T-Mobile, technology, Tesla, Tesla Bot, Weekly Edition
A 21-year-old Virginia native living in Turkey is allegedly behind the massive T-Mobile hack, China adopts a new national privacy law, and is Elon Musk’s Tesla Bot just creepy or is it ...
New California Data Privacy Law, Wyze Data Leak, ToTok Spy App
Tom Eston | | California, CCPA, Cybersecurity, Data breach, Data leak, Data Privacy, Law, Podcast Episodes, Privacy, Privacy Law, Silent Pocket, spying, surveillance, ToTok, UAE, Weekly Blaze Podcast, Wyze
In episode 102: Details on the new California data privacy law, the Wyze data leak, and what is the ToTok app and could it be spying on you? ** Show notes and ...
Illinois Supreme Court Has Ruled No Proof Of Harm Needed In Biometric Privacy Violations
The ruling of the Illinois Supreme Court, based on Illinois Compiled Statutes 740 ILCS 14/ - The Biometric Information Privacy Act is the foundation for this bit of privacy related good news ...
Privacy Awareness Week Day 4: Business Obligations: What should I be doing to protect personal information?
Before we can talk about protecting personal information, the first question you must ask is “What personal information do we process throughout the organisation?”Do you understand:a) How you collate personal information and when?b) Why ...