Google’s ‘Privacy Sandbox’ plan to remove third party cookies from its Chrome browser is being probed by a regulator in the United Kingdom over concerns it would be anticompetitive. The tech giant’s proposals, which have yet to be finalised, would see third party cookies disabled on its Chrome and Chromium browsers. These cookies currently help […]
Privacy
WhatsApp updates privacy policy to include mandatory data-sharing with Facebook
Messaging platform WhatsApp has announced that from next month it will require users to agree to their data being shared with parent company Facebook if they wish to continue using the service. The updated privacy policy will for the first time make it mandatory for users to accept the sharing from 8th February. WhatsApp has […]
Business Focus: PrivSec fundraising deals in November and December
A round-up of fundraising and business deals from the privacy, data protection and cybersecurity sectors in November and December 2020. 21st December: Privacy, security and data governance platform OneTrust announced a $300million Series C funding round, bringing the total amount of money raised by the company in the past 18 months to $710 million. TCV […]
What the Brexit trade agreement says about data protection, privacy and cybersecurity
We now have a trade agreement in place in time for the end of the Brexit transition period tonight. But what does the document say about data protection, privacy and cybersecurity? PrivSec Report pulls out the key points. DATA PROTECTION AND PRIVACY The agreement makes it clear that as a general principle nothing in […]
At-a-glance: Canada’s proposed new privacy law
Privacy legislation in Canada will expand data privacy obligations. PrivSec Report summarises the key changes in the bill in its current form. In November, Bill C-11 for the Digital Charter Implementation Act, 2020 was introduced to the House of Commons as part of Canada’s updated privacy legislation, which will enact the Consumer Privacy Protection Act […]
ICO welcomes the free flow of personal data from the EU and EEA to the UK for six months under trade agreement
The trade deal announced last week between the European Union and United Kingdom has been welcomed by the Information Commissioner. “This is the best possible outcome for UK organisations processing personal data from the EU”, said Elizabeth Denham, in a statement yesterday. Denham was responding to the news that the UK-EU Trade and Cooperation Agreement, […]
Preparing for Canada’s new and improved privacy act (sponsored video Q&A)
The Consumer Privacy Protection Act will be the very first major overhaul of Canada’s privacy laws in what can be described as a much-needed update in the governance and protection of personal information in Canada. In this video session, Microsoft’s Jason Bero and Richie Rai help us unpack what this Bill means for businesses and […]
UK Online Safety Bill may have implications for freedom of expression and privacy, says digital rights Group
The UK Online Safety Bill may have “implications for freedom of expression and privacy” as private messaging may fall within the scope of the regulatory framework, a digital rights group has warned. On 15 December, the UK government published its full response to the Online Harms White Paper consultation ahead of the publication of the […]
The data protection and privacy trends to watch out for in 2021
PrivSec Report looks forward to the new year and what it could mean for the privacy and data protection worlds. Here are the key topics and trends we expect to see in 2021: Privacy culture for all, as public awareness grows 2020 has been defined by the global pandemic which has affected every part of […]
Microsoft – Reduce risk with an integrated approach to internal and external threats (sponsored video Q&A)
CISOs and security teams are facing more challenges than ever due to increasing complexity of expanding attack surface, more sophisticated cyber-attacks and additional security challenges brought by the remote work. This video session discusses a framework modern enterprises can use to implement internal and external protection across the threat kill chain thus containing exfiltration by […]