article thumbnail

DEEP TECH NEWS: Respecting individual rights by using ‘privacy preserving aggregate statistics’

The Last Watchdog

Related: The role of ‘attribute based encryption’ There’s nothing intrinsically wrong with companies seeking to better understand their customers. However, over the past 20 years the practice of analyzing user data hasn’t advanced much beyond serving the business models of these tech giants. That could be about to change.

Privacy 218
article thumbnail

The ICO urges organisations to start using privacy enhancing technologies to share personal data safely, securely and anonymously

Data Protection Report

The Guidance sits alongside the ICO’s recommendation that organisations should, if they haven’t already, start using PETs to share personal data safely, securely and anonymously. The Guidance clarifies that there is no definition of PETs within data protection law and that the concept covers various technologies and techniques.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ITALY: the Garante aligns with CNIL and DSB holding that the use of Google Analytics leads to unlawful transfer of Personal Data

DLA Piper Privacy Matters

The Italian privacy authority, the Garante, deemed that the use of Google Analytics results in unlawful transfers of personal data to the United States in violation of the principles outlined in the Schrems II ruling. In Order No. The disputed facts. Code § 1881(b)(4), which subjects the company to the surveillance of U.S.

article thumbnail

Evil Telegram campaign: Trojanized Telegram apps found on Google Play

Security Affairs

The analysis of the code revealed that most packages of the trojanized version of Telegram look the same as the standard ones. The collected information is then encrypted and cached into a temporary file named tgsync.s3. ” reads the analysis published by Kaspersky. ” concludes the analysis.

article thumbnail

European rulings on the use of Google Analytics and how it may affect your business

Data Protection Report

At issue was the transfer of personal data from the EU to the US through the use of Google Analytics. Many of our clients are using the firm’s technical tool suite, NT Analyzer , to assist with their data protection and privacy efforts. An Important Reminder. www.website.com/pg1/? www.website.com/pg1/?

Analytics 127
article thumbnail

How situational analysis helps your school become #BreachReady

IT Governance

In this blog, we’ll consider situational analysis, how to assess what’s happening in the school and how to support staff to protect the data in their care. Situational analysis – understand what’s happening now. There are several ways to reduce the likelihood and severity of data breaches. Introduce device encryption.

GDPR 56
article thumbnail

Reading the “ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS” report

Security Affairs

of all the stolen data contains GDPR personal data based on this analysis; In 95.3% of all the stolen data contains GDPR personal data based on this analysis; In 95.3%