• First Reference
  • About us
  • Contact us
  • Blog Signup 📨

First Reference Talks

Discussions on Human Resources, Employment Law, Payroll and Internal Controls

  • Home
  • About
  • Archives
  • Resources
  • Buy Policies

privacy protection

By Occasional Contributors | 2 Minutes Read July 18, 2017

Cybersecurity in a post-Ashley Madison world

In a recent key finding, PIPEDA Report of Findings #2016-005 - Joint investigation of Ashley Madison, the Office of the Privacy Commissioner of Canada provided crucial guidance to organizations in relation to information protection and cybersecurity.

Article by Occasional Contributors / Business, Privacy / Ashley Madison, cyber threat, cybersecurity, IT, Personal Information Protection and Electronic Documents Act, PIPEDA, privacy, privacy protection, risk, risk management, security

By Occasional Contributors | 3 Minutes Read February 27, 2017

Blockchain and privacy: Transparency and innovation pose challenges for data protection

A blockchain is a peer network of nodes that use a distributed ledger that can be used to track transactions involving value including money, votes, property, etc. The most well-known application of blockchain technology is bitcoin. Transactions on a blockchain are not regulated by any central counterparty: the individuals involved in a given transaction provide their information (including personal information), a record is created that can be verified by nodes in the network. In this sense, the users forming the community act as their own regulators.

Article by Occasional Contributors / Information Technology, Privacy / bitcoin, blockchain, blockchain technology, data protection, privacy protection

By Occasional Contributors | 3 Minutes Read December 22, 2016

Cybersecurity best practices for connected cars

Some of the most significant concerns with connected vehicles are cybersecurity and privacy protection. These concerns were the main impetus behind the creation in the US of the Auto Information Sharing and Analysis Centre (ISAC) by a group of US automakers in July of 2014. The group allows its members to share information about threats and vulnerabilities, conduct analysis and develop industry solutions. The Auto ISAC has now released its “Automotive Cybersecurity Best Practices”.

Article by Occasional Contributors / Business, Finance and Accounting, Information Technology, Privacy / Alliance of Automobile Manufacturers, Association of Global Automakers, Auto Information Sharing and Analysis Centre, Automotive Cybersecurity Best Practices, Canadian privacy laws, Consumer Privacy Protection Principles, cybersecurity, cybersecurity best practices, Framework for Automotive Cybersecurity, Personal Information and Protection of Electronic Documents Act, PIPEDA, privacy, privacy protection, risk management, vehicle cybersecurity, vehicle technologies

  • Go to page 1
  • Go to page 2
  • Go to Next Page »

Footer

About us

Established in 1995, First Reference is the leading publisher of up to date, practical and authoritative HR compliance and policy databases that are essential to ensure organizations meet their due diligence and duty of care requirements.

First Reference Talks

  • Home
  • About
  • Archives
  • Resources
  • Buy Policies

Main Menu

  • About First Reference
  • Resources
  • Contact us
  • 1 800 750 8175

Stay Connected

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

We welcome your comments on our blog articles. However, we do not respond to specific legal questions in this space.
We do not provide any form of legal advice or legal opinion. Please consult a lawyer in your jurisdiction or try one of our products.


Copyright © 2009 - 2023 · First Reference Inc. · All Rights Reserved
Legal and Copyright Notices · Publisher's Disclaimer · Privacy Policy · Accessibility Policy