article thumbnail

Insulin App Maker Faces Privacy Lawsuit for Web Tracker Use

Data Breach Today

Proposed Class Action Filed in Breach Affecting Users of Medtronic MiniMed InPen Medical device maker Medtronic MiniMed violated patient privacy by using tracking and authentication technologies such as Google Analytics and Firebase in its InPen diabetes management app and services, according to a proposed federal class action lawsuit filed this week. (..)

Privacy 287
article thumbnail

GUEST ESSAY: How the FIDO Alliance helps drive the move to passwordless authentication

The Last Watchdog

This traditional authentication method is challenging to get rid of, mostly because it’s so common. And for businesses, transitioning to new authentication solutions can be expensive and time-consuming. It supports standards that make implementing newer, stronger authentication methods possible for businesses.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ISMG Editors: Are We Closing in on a Federal Privacy Law?

Data Breach Today

federal privacy law, and next-gen authentication technologies.

Privacy 315
article thumbnail

News Alert: W3C advances technology to streamline payment authentication

The Last Watchdog

The World Wide Web Consortium today announced a standardization milestone for a new browser capability that helps to streamline user authentication and enhance payment security during Web checkout. Customer authentication For the past 15 years, e-commerce has increased as a percentage of all retail sales.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

This report offers insights for cybersecurity, compliance, and privacy executives at healthcare organizations, as well as for policymakers and auditors. The healthcare industry has massively adopted web tracking tools, including pixels and trackers.

article thumbnail

Fast and Safe Protection for 5G Subscriber Privacy and Authentication

Thales Cloud Protection & Licensing

Fast and Safe Protection for 5G Subscriber Privacy and Authentication. The protection and authenticity of subscriber authentication and privacy in 5G networks is equally important to requirements for increased reliability and low latency. Figure 1: 5G Core – Subscriber Privacy and AV Generation.

article thumbnail

Data privacy examples

IBM Big Data Hub

These are just some examples of how organizations support data privacy , the principle that people should have control of their personal data, including who can see it, who can collect it, and how it can be used. One cannot overstate the importance of data privacy for businesses today.