Home Depot security breach: Any lessons to be learned?
Home Depot Inc. recently suffered a security breach under which 56 million credit cards may have been compromised in a five-month attack on its payment terminals. Yesterday, an article was discussing the fact that the risks of hacking were clear to computer experts inside Home Depot, that Home Depot relied on outdated software to protect its network […] Read more
Telus: More Transparency from Telcos
In response to concerns about widespread Internet surveillance by police and law enforcement agencies, Telus Corp released yesterday its 2013 transparency report which reveals that it has received more than 100,000 requests for customer data from the government and law enforcement agencies in 2013. The Office of the Privacy Commissioner of Canada issued a Statement in April […] Read more
An officer and a porn movie
A Montreal female police officer Stefanie Trudeau also known as Matricule 728 (or Agent number 728), earned infamy during the Quebec 2012 student protests. She was also caught on video (which went viral), violently arresting a man drinking beer outside his apartment for which she is currently facing one count of assault. AD4 Distribution Canada, […] Read more
Lawsuits for Data Breaches: Useless or Strategic?
Solove published an interesting piece today entitled: “Why Do Lawsuits for Data Breaches Continue Even Though the Law Is Against Plaintiffs?” He explains that while the U.S. law has been far from kind to plaintiffs in data breaches (most courts dismiss claims for lack of harm), lawsuits keep coming. We have a similar situation in […] Read more
Mobile apps and privacy challenges
The WSP reports that most mobile apps don’t respect users’ privacy. The Global Privacy Enforcement Network (GPEN) undertook last May a second privacy sweep demonstrating the ongoing commitment of privacy enforcement authorities to work together to promote privacy protection around the world. It is reported that some 26 privacy enforcement authorities in 19 countries participated […] Read more
Is behavioral advertising harmful?
The Economist published a great piece on behavioral advertising : “Getting to know you: Everything people do online is avidly followed by advertisers and third-party trackers”. I blogged yesterday about the fact that the article raises an interesting point: industry players often take the position that since they do not know the users’ names, what they are collecting […] Read more
Should behavioral advertising profiles qualify as “personal information”?
The Economist published a great piece on behavioral advertising today: “Getting to know you: Everything people do online is avidly followed by advertisers and third-party trackers”. The article discusses the fact that gathering information about users and grouping them into sellable “segments” has become important for the $120 billion online advertising economy. The article raises an […] Read more
Verizon: When can a Telco use subscriber’s personal information for marketing purposes?
In the U.S., Verizon has recently been slapped with a $7.4 million fine by the U.S. Federal Communications Commission (FCC) for a privacy violation, the largest fine the FCC has ever imposed for a privacy violation. What did Verizon do to deserve this fine? It failed to provide the choice of opting out of its […] Read more
IIROC Security Breach : Class Action Not Authorized
The Investment Industry Regulatory Organization of Canada (IIROC or in French OCRCVM) who monitors all trading activity across the country suffered a security breach which was reported in April 2013. It was revealed that an employee lost a USB drive containing the personal information of more than 52,000 individuals with accounts at more than 30 […] Read more
Deleting Sensitive Material from iCloud
The reported iCloud security incident, which exposed photos of celebrities, has highlighted the potential risks of storing files online. According to a WSP article, the iCloud vulnerability was exposed on the code hosting site Github: developers discovered that Apple’s “Find My iPhone” feature could be compromised by a brute force attacks, which is an attack […] Read more