There are continued efforts by US and worldwide governments and law enforcement to compel tech providers to create backdoors into encryption technologies to allow access to the data if they think they need it.
The Federal Trade Commission (FTC) is considered by many organizations to be the preeminent arbiter of privacy in the US. How did the FTC develop this authority over the years? What have been some of the most privacy-impacting cases?
As encryption and other privacy-enhancing tech is increasingly used, government agencies are seeking new ways to access communications & other data that is also being increasingly generated by new computing devices, apps and websites.
Education environments have inherent privacy risks. Schools are in open environments, with students, teachers, parents, guests, sales vendors, & folks from other schools, going through the facilities every day.
Almost every day there are more reports of voting security problems. Voter registration data being sold on the dark web for $12,500 for certain states. Ballot case security being defeated and not leaving any trails to track the hackers.
There are growing numbers of cyber-attacks being launched by terrorists throughout the world against critical infrastructure networks not only within governments, but also within the healthcare, financial, utilities, and transportation industries, just to name a few.
US intelligence agencies confirm that during the run-up to the 2016 elections Russian hackers attacked DNC & RNC election & related servers. Digital attacks on voter registration servers occurred in all states & in a few isolated cases hackers got into voter records servers.
There are many security & privacy issues related to business process outsourcing (BPO) in general, and to contact centers in particular. The Data Privacy Asia conference (www.DataPrivacyAsia.com) in Manila, Philippines, Sept 19 & 20 will provide advice for how to effectively address those issues.
Cybercrime throughout the world is increasing. As technologies evolve while legacy systems & applications continue to be used, & long-time physical & operational information threats & vulnerabilities still exist, the pathways to & through information systems & devices increase astronomically.