SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
Data Breach & Protection | Online Trust Alliance Page 1 of 7 
Home 
Subscribe 
Privacy Policy 
Contact Us 
Join OTA 
Donate OTA 
Search 
▼ 
Home▼ 
Initiatives▼ 
Resources▼ 
Best Practices 
Committees 
News & Events▼ 
Membership▼ 
About Us▼ 
Blog 
Print 
Twitter 
Linkedin 
Facebook 
Youtube 
Home › Resources › Data Breach & Protection 
Data Breach & Protection 
https://otalliance.org/resources/data-breach-protection 10/27/2014
Data Breach & Protection | Online Trust Alliance Page 2 of 7 
As society and business become increasingly reliant 
on data, the threat landscape continues to 
exponentially expand. Online services introduce 
stronger and more innovative defenses against 
cybersecurity threats with each passing year. 
Unfortunately, cybercriminals simultaneously 
create new techniques and deceptive tactics that 
outpace such efforts. The result underscores the 
need for businesses to make security and data 
protection a priority, and to be prepared for a breach incident. 
The OTA Data Protection & Breach Readiness Guide has been developed to help organizations 
of all sizes in both the public and private sector. Content has been included to help aid a broad 
range of stakeholders ranging from business and technical decision makers and privacy and 
security professionals to web and app developers. The goal is to help readers better 
understand the issues and solutions which can enhance their data protection practices and 
enable them to develop readiness plans in the event they incur a data loss incident. 
Even the most cyber-savvy organizations have found themselves exposed and ill prepared to 
manage the effects of a data breach. The best defense is implementing a broad set of 
operational and technical best practices that helps protect your company and your customers’ 
personal data. The second step is to be prepared with a data lifecycle plan that allows a 
company to respond with immediacy. Ultimately, industry needs to understand that effectively 
handling a breach is a shared responsibility of every functional group within the organization. 
A key to success is moving from a compliance perspective to one of stewardship. This 
perspective recognizes the long term impact to a brand, the importance of consumer trust and 
implications and considerations with vendors and business partners. 
2014 Data Protection & Breach Readiness Guide - Overview 
The 2014 Data Protection & Breach Readiness Guide (Guide) is designed to help businesses 
app developers and service providers understand the issues, considerations and solutions that 
will enhance their data protection practices and enable them to develop readiness plans in the 
event they incur a data loss incident. 
2014 Data Privacy Day & Breach Readiness Guide 
Supporters 
Wed, Jan 22, 2014 
New York City, NY - “Businesses and organizations have a responsibility to protect consumer 
privacy and prevent data breaches from aggressive cyber thieves,” said Washington State 
Attorney General Bob Ferguson. “Consumers deserve to know who they can trust. The Online 
Trust Alliance arms organizations with critical information to reduce cyber risk and protect 
consumers.” 
https://otalliance.org/resources/data-breach-protection 10/27/2014
Data Breach & Protection | Online Trust Alliance Page 3 of 7 
2014 Data Protection & Breach Readiness Guide 
The Guide has been developed to aid a broad range of stakeholders ranging from business and 
technical decision makers and privacy and security professionals to web and app developers. 
The goal is to help readers better understand the issues and solutions which can enhance their 
data protection practices and enable them to develop readiness plans in the event they incur a 
data loss incident. 
Feb 4, 2014 
KOMOnews.com 
KOMO TV Coverage 
Data breaches on the rise. What's being done? 
Online Trust Alliance Finds Data Breaches Spiked to Record 
Level in 2013 
Wed, Jan 22, 2014 
Seattle, Washington - The Online Trust Alliance (OTA), the non-profit with the mission to 
enhance online trust, user empowerment and innovation, today recommended a series of best 
practices to help prevent online data breaches and other exploits, in collaboration with high-profile 
brands including American Greetings Interactive, AVG, Microsoft, Publishers Clearing 
House and Symantec. These recommendations, released today in OTA’s 2014 Data Protection 
& Breach Readiness Guide, were accompanied by several eye-opening statistics. 
Upcoming Events News 
Wed, Oct 29, 2014 
ICANN Los Angeles Recap Webinar - Preparing for gTLDs 
With more than 400 new gTLD registries now delegated and over 2.6 million new gTLD 
registrations, a changing Internet governance landscape, and requirements for enhancing 
ICANN accountability resulting from the IANA transition, assessing the impact on your 
business is vital. Join Domain Management and gTLD Experts, Elisa Cooper and Matt Serlin of 
MarkMonitor® for guidance on navigating this complex environment. 
Thu, Oct 30, 2014 
https://otalliance.org/resources/data-breach-protection 10/27/2014
Data Breach & Protection | Online Trust Alliance Page 4 of 7 
Cyber Risk Summit 
The Cyber Risk Summit brings together cyber security specialists, technologists, 
entrepreneurs, industry experts and business leaders to tackle the challenges and 
opportunities that come with cyber security strategies. Featuring break out sessions keyed in 
for your needs connecting with peers and strategic insights, this is a day you can't afford to 
miss. 
Thu, Oct 30, 2014 
Always On: The Digital Consumer 
Welcome to the age of the Internet of Things. Devices in our homes are connected to the 
Internet, our cars are starting to talk to each other wirelessly, and we are attaching mobile-enabled 
devices to our wrists to measure fitness. Awesome or scary? Most likely, a bit of both. 
Tue, Nov 4, 2014 
Privacy & Big Data Overload 
Due to the evolution of personalized, data-driven digital marketing, companies now have 
infinite amounts of personally identifiable information (PII) about their customers—and it just 
keeps exponentially growing. In fact, according to the Pew Research Center, the volume of 
business data worldwide—across all companies—doubles every 1.2 years. 
But how should you use this data? And at what point does the information known about your 
consumers—and the ways you use this information—risk consumer privacy? Is there such thing 
as too much data? 
OTA Blog Newsletters 
Wed, Oct 22, 2014 
Passage of Data Breach Legislation 
With the rapid surge in data breaches impacting millions of households this year, OTA was 
optimistic on the possible passage of data breach legislation. Unfortunately it is appearing 
very unlikely we will see any such legislation, driven in part by the partisan efforts and trade 
groups who are focused on protecting their business member's short-term interests and 
consumer advocates who appear to be unwilling to compreomise. OTA continues to be a voice 
of reason advocating a framework modeled off of CAN-SPAM and COPPA, providing 
businesses with clarity and ease of repor 
Wed, Oct 15, 2014 
https://otalliance.org/resources/data-breach-protection 10/27/2014
Data Breach & Protection | Online Trust Alliance Page 5 of 7 
Sen Franken Calls DOJ to Shut Down Stalking Apps 
Sen. Al Franken is pushing the Justice Department to do more to protect smartphone users 
from "stalking apps" that surreptitiously track their targets. In a letter to U.S. Attorney General 
Eric Holder on Monday, Franken noted the department's work on the issue - including the 
recent indictment of a man who operated one spyware app, StealthGenie - but said it needs to 
go further. OTA supports this effort. Share your views and interest in signing on in support of 
this effort. Read more > 
Fri, Sep 26, 2014 
Email Capture at Retail Point of Sale - Call for Best Practices 
As we head towards the holiday buying season and increasingly retailers are multi channel, 
questions regarding email collection at point of sale are being raised. Collection at time of 
purchase provides significant benefits to the retailer and done right the same for the 
consumer. That said, how can a consumer understand what and how the email is being used? 
What forms of notice are appropriate and is it reasonable a sales clerk can understand the 
nuances of data collection, transactional purposes and sharing with affiliate or unaffiliated 
third partie 
Thu, Sep 25, 2014 
Rupert Murdoch's News Corp vs Google - A war of words 
The anxiety and class between major publishers and content providers vs dominate market 
players including Google is at an all time high. In News Corp's submission to the EU it asserts 
that Google is a “platform for piracy and the spread of malicious networks” and “a company 
that boasts about its ability to track traffic [but] chooses to ignore the unlawful and unsavory 
content that surfaces after the simplest of searches”. Share your thoughts and perspectives. 
Are such claims legitimate? See 
Resources 
Advertising Integrity & Fraud 
Data Breach & Protection 
Email Security & Integrity 
Malicious Threats 
Web and Mobile Security 
Educational Videos and Webinars 
Glossary 
https://otalliance.org/resources/data-breach-protection 10/27/2014
Data Breach & Protection | Online Trust Alliance Page 6 of 7 
Initiatives 
Brand Protection 
Data Privacy Day 
Identity Theft 
Online Trust Audit & Honor Roll 
Email Integrity Audit 
Privacy 
Public Policy 
Security 
Best Practices 
Committees 
News & Events 
OTA In The News 
Newsletters 
Press Releases 
Upcoming Events 
Recent Events 
Events Archive 
Membership 
Benefits 
History & Overview 
Member Levels 
Working Committees 
Donate 
About Us 
Members 
Members 
https://otalliance.org/resources/data-breach-protection 10/27/2014
Data Breach & Protection | Online Trust Alliance Page 7 of 7 
Board of Directors 
Non-Governmental Organizations 
Strategic Advisors 
Committees 
Staff 
Careers 
© 2014 Online Trust Alliance 
Home 
Subscribe 
Privacy Policy 
Contact Us 
Printer-friendly version 
https://otalliance.org/resources/data-breach-protection 10/27/2014

Mais conteúdo relacionado

Mais procurados

As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Javier Gonzalez
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
You Are the Target
You Are the TargetYou Are the Target
You Are the TargetEMC
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalRobertPike
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250Chris Crowe
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignStephanie Holman
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeEMC
 
Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPPhilippe Boivineau
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionEMC
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...Ulf Mattsson
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesCompTIA
 

Mais procurados (20)

As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) final
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication Challenge
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WP
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 

Destaque

Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secureMeg Weber
 
Cyber risk scorecards
Cyber risk scorecardsCyber risk scorecards
Cyber risk scorecardsMeg Weber
 
2012 March Luncheon: Education Summit
2012 March Luncheon: Education Summit2012 March Luncheon: Education Summit
2012 March Luncheon: Education SummitMeg Weber
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcementMeg Weber
 
2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)
2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)
2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)Meg Weber
 
Future of cyber in the board room: Michael Cockrill Presents
Future of cyber in the board room: Michael Cockrill PresentsFuture of cyber in the board room: Michael Cockrill Presents
Future of cyber in the board room: Michael Cockrill PresentsMeg Weber
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
TAG Luncheon: A+ Washington
TAG Luncheon: A+ WashingtonTAG Luncheon: A+ Washington
TAG Luncheon: A+ WashingtonMeg Weber
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
State of indiana case study
State of indiana case studyState of indiana case study
State of indiana case studyMeg Weber
 
TAG Luncheon: Lean: FastCap Style
TAG Luncheon: Lean: FastCap StyleTAG Luncheon: Lean: FastCap Style
TAG Luncheon: Lean: FastCap StyleMeg Weber
 
Can we be faster than disaster bill boyd
Can we be faster than disaster   bill boydCan we be faster than disaster   bill boyd
Can we be faster than disaster bill boydMeg Weber
 
TAG Luncheon: 2012 Tax Update
TAG Luncheon: 2012 Tax UpdateTAG Luncheon: 2012 Tax Update
TAG Luncheon: 2012 Tax UpdateMeg Weber
 
Technology Development Center Introduction
Technology Development Center IntroductionTechnology Development Center Introduction
Technology Development Center IntroductionMeg Weber
 
TAG Luncheon: Center for Innovation
TAG Luncheon: Center for InnovationTAG Luncheon: Center for Innovation
TAG Luncheon: Center for InnovationMeg Weber
 
TAG Luncheon: State of Technology
TAG Luncheon: State of TechnologyTAG Luncheon: State of Technology
TAG Luncheon: State of TechnologyMeg Weber
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesMeg Weber
 

Destaque (18)

Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
Cyber risk scorecards
Cyber risk scorecardsCyber risk scorecards
Cyber risk scorecards
 
2012 March Luncheon: Education Summit
2012 March Luncheon: Education Summit2012 March Luncheon: Education Summit
2012 March Luncheon: Education Summit
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcement
 
2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)
2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)
2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)
 
Deber de ingles
Deber de inglesDeber de ingles
Deber de ingles
 
Future of cyber in the board room: Michael Cockrill Presents
Future of cyber in the board room: Michael Cockrill PresentsFuture of cyber in the board room: Michael Cockrill Presents
Future of cyber in the board room: Michael Cockrill Presents
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
TAG Luncheon: A+ Washington
TAG Luncheon: A+ WashingtonTAG Luncheon: A+ Washington
TAG Luncheon: A+ Washington
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
State of indiana case study
State of indiana case studyState of indiana case study
State of indiana case study
 
TAG Luncheon: Lean: FastCap Style
TAG Luncheon: Lean: FastCap StyleTAG Luncheon: Lean: FastCap Style
TAG Luncheon: Lean: FastCap Style
 
Can we be faster than disaster bill boyd
Can we be faster than disaster   bill boydCan we be faster than disaster   bill boyd
Can we be faster than disaster bill boyd
 
TAG Luncheon: 2012 Tax Update
TAG Luncheon: 2012 Tax UpdateTAG Luncheon: 2012 Tax Update
TAG Luncheon: 2012 Tax Update
 
Technology Development Center Introduction
Technology Development Center IntroductionTechnology Development Center Introduction
Technology Development Center Introduction
 
TAG Luncheon: Center for Innovation
TAG Luncheon: Center for InnovationTAG Luncheon: Center for Innovation
TAG Luncheon: Center for Innovation
 
TAG Luncheon: State of Technology
TAG Luncheon: State of TechnologyTAG Luncheon: State of Technology
TAG Luncheon: State of Technology
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 

Semelhante a Online Trust Alliance Recommendations

2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4Meg Weber
 
DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014- Mark - Fullbright
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis
 
Accenture four keys digital trust
Accenture four keys digital trustAccenture four keys digital trust
Accenture four keys digital trustOptimediaSpain
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportFERMA
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustGrant Thornton LLP
 
GWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox BlueGWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox BlueGWAVA
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
 
Lay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyLay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyTinuiti
 
Enterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey ReportEnterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey ReportEchoworx
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Kayisa Herman Dube
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Mark Skilton
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Journal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docxJournal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docxchristiandean12115
 

Semelhante a Online Trust Alliance Recommendations (20)

2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4
 
DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
 
Accenture four keys digital trust
Accenture four keys digital trustAccenture four keys digital trust
Accenture four keys digital trust
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
MindSHARE: Staying Secure Online
MindSHARE: Staying Secure OnlineMindSHARE: Staying Secure Online
MindSHARE: Staying Secure Online
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
GWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox BlueGWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
Lay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyLay of the Land for All Things Privacy
Lay of the Land for All Things Privacy
 
Enterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey ReportEnterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey Report
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Journal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docxJournal of Business Continuity & Emergency Planning Volume 7 N.docx
Journal of Business Continuity & Emergency Planning Volume 7 N.docx
 

Mais de Meg Weber

Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
Department of Homeland Security Guidance
Department of Homeland Security GuidanceDepartment of Homeland Security Guidance
Department of Homeland Security GuidanceMeg Weber
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityMeg Weber
 
DHS Guidelines
DHS GuidelinesDHS Guidelines
DHS GuidelinesMeg Weber
 
Cybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallCybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallMeg Weber
 
5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risks5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risksMeg Weber
 
Welcome to the Cyber Risk Summit
Welcome to the Cyber Risk SummitWelcome to the Cyber Risk Summit
Welcome to the Cyber Risk SummitMeg Weber
 
WCC Programs Overview
WCC Programs OverviewWCC Programs Overview
WCC Programs OverviewMeg Weber
 
Audit summary from security solutions and ovation tech
Audit summary from security solutions and ovation techAudit summary from security solutions and ovation tech
Audit summary from security solutions and ovation techMeg Weber
 
Jb hunt case study
Jb hunt case studyJb hunt case study
Jb hunt case studyMeg Weber
 
Nemours case study nemours embraces app innovation with mobile iron
Nemours case study  nemours embraces app innovation with mobile ironNemours case study  nemours embraces app innovation with mobile iron
Nemours case study nemours embraces app innovation with mobile ironMeg Weber
 
Mark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMeg Weber
 
Jimmy johns infractions
Jimmy johns infractionsJimmy johns infractions
Jimmy johns infractionsMeg Weber
 
2014 Economic Forecast: Leadership's Role in a Changing Economy
2014 Economic Forecast: Leadership's Role in a Changing Economy2014 Economic Forecast: Leadership's Role in a Changing Economy
2014 Economic Forecast: Leadership's Role in a Changing EconomyMeg Weber
 

Mais de Meg Weber (14)

Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Department of Homeland Security Guidance
Department of Homeland Security GuidanceDepartment of Homeland Security Guidance
Department of Homeland Security Guidance
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
DHS Guidelines
DHS GuidelinesDHS Guidelines
DHS Guidelines
 
Cybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallCybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-small
 
5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risks5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risks
 
Welcome to the Cyber Risk Summit
Welcome to the Cyber Risk SummitWelcome to the Cyber Risk Summit
Welcome to the Cyber Risk Summit
 
WCC Programs Overview
WCC Programs OverviewWCC Programs Overview
WCC Programs Overview
 
Audit summary from security solutions and ovation tech
Audit summary from security solutions and ovation techAudit summary from security solutions and ovation tech
Audit summary from security solutions and ovation tech
 
Jb hunt case study
Jb hunt case studyJb hunt case study
Jb hunt case study
 
Nemours case study nemours embraces app innovation with mobile iron
Nemours case study  nemours embraces app innovation with mobile ironNemours case study  nemours embraces app innovation with mobile iron
Nemours case study nemours embraces app innovation with mobile iron
 
Mark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMark Anderson on Cyber Security
Mark Anderson on Cyber Security
 
Jimmy johns infractions
Jimmy johns infractionsJimmy johns infractions
Jimmy johns infractions
 
2014 Economic Forecast: Leadership's Role in a Changing Economy
2014 Economic Forecast: Leadership's Role in a Changing Economy2014 Economic Forecast: Leadership's Role in a Changing Economy
2014 Economic Forecast: Leadership's Role in a Changing Economy
 

Último

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 

Último (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 

Online Trust Alliance Recommendations

  • 1. Data Breach & Protection | Online Trust Alliance Page 1 of 7 Home Subscribe Privacy Policy Contact Us Join OTA Donate OTA Search ▼ Home▼ Initiatives▼ Resources▼ Best Practices Committees News & Events▼ Membership▼ About Us▼ Blog Print Twitter Linkedin Facebook Youtube Home › Resources › Data Breach & Protection Data Breach & Protection https://otalliance.org/resources/data-breach-protection 10/27/2014
  • 2. Data Breach & Protection | Online Trust Alliance Page 2 of 7 As society and business become increasingly reliant on data, the threat landscape continues to exponentially expand. Online services introduce stronger and more innovative defenses against cybersecurity threats with each passing year. Unfortunately, cybercriminals simultaneously create new techniques and deceptive tactics that outpace such efforts. The result underscores the need for businesses to make security and data protection a priority, and to be prepared for a breach incident. The OTA Data Protection & Breach Readiness Guide has been developed to help organizations of all sizes in both the public and private sector. Content has been included to help aid a broad range of stakeholders ranging from business and technical decision makers and privacy and security professionals to web and app developers. The goal is to help readers better understand the issues and solutions which can enhance their data protection practices and enable them to develop readiness plans in the event they incur a data loss incident. Even the most cyber-savvy organizations have found themselves exposed and ill prepared to manage the effects of a data breach. The best defense is implementing a broad set of operational and technical best practices that helps protect your company and your customers’ personal data. The second step is to be prepared with a data lifecycle plan that allows a company to respond with immediacy. Ultimately, industry needs to understand that effectively handling a breach is a shared responsibility of every functional group within the organization. A key to success is moving from a compliance perspective to one of stewardship. This perspective recognizes the long term impact to a brand, the importance of consumer trust and implications and considerations with vendors and business partners. 2014 Data Protection & Breach Readiness Guide - Overview The 2014 Data Protection & Breach Readiness Guide (Guide) is designed to help businesses app developers and service providers understand the issues, considerations and solutions that will enhance their data protection practices and enable them to develop readiness plans in the event they incur a data loss incident. 2014 Data Privacy Day & Breach Readiness Guide Supporters Wed, Jan 22, 2014 New York City, NY - “Businesses and organizations have a responsibility to protect consumer privacy and prevent data breaches from aggressive cyber thieves,” said Washington State Attorney General Bob Ferguson. “Consumers deserve to know who they can trust. The Online Trust Alliance arms organizations with critical information to reduce cyber risk and protect consumers.” https://otalliance.org/resources/data-breach-protection 10/27/2014
  • 3. Data Breach & Protection | Online Trust Alliance Page 3 of 7 2014 Data Protection & Breach Readiness Guide The Guide has been developed to aid a broad range of stakeholders ranging from business and technical decision makers and privacy and security professionals to web and app developers. The goal is to help readers better understand the issues and solutions which can enhance their data protection practices and enable them to develop readiness plans in the event they incur a data loss incident. Feb 4, 2014 KOMOnews.com KOMO TV Coverage Data breaches on the rise. What's being done? Online Trust Alliance Finds Data Breaches Spiked to Record Level in 2013 Wed, Jan 22, 2014 Seattle, Washington - The Online Trust Alliance (OTA), the non-profit with the mission to enhance online trust, user empowerment and innovation, today recommended a series of best practices to help prevent online data breaches and other exploits, in collaboration with high-profile brands including American Greetings Interactive, AVG, Microsoft, Publishers Clearing House and Symantec. These recommendations, released today in OTA’s 2014 Data Protection & Breach Readiness Guide, were accompanied by several eye-opening statistics. Upcoming Events News Wed, Oct 29, 2014 ICANN Los Angeles Recap Webinar - Preparing for gTLDs With more than 400 new gTLD registries now delegated and over 2.6 million new gTLD registrations, a changing Internet governance landscape, and requirements for enhancing ICANN accountability resulting from the IANA transition, assessing the impact on your business is vital. Join Domain Management and gTLD Experts, Elisa Cooper and Matt Serlin of MarkMonitor® for guidance on navigating this complex environment. Thu, Oct 30, 2014 https://otalliance.org/resources/data-breach-protection 10/27/2014
  • 4. Data Breach & Protection | Online Trust Alliance Page 4 of 7 Cyber Risk Summit The Cyber Risk Summit brings together cyber security specialists, technologists, entrepreneurs, industry experts and business leaders to tackle the challenges and opportunities that come with cyber security strategies. Featuring break out sessions keyed in for your needs connecting with peers and strategic insights, this is a day you can't afford to miss. Thu, Oct 30, 2014 Always On: The Digital Consumer Welcome to the age of the Internet of Things. Devices in our homes are connected to the Internet, our cars are starting to talk to each other wirelessly, and we are attaching mobile-enabled devices to our wrists to measure fitness. Awesome or scary? Most likely, a bit of both. Tue, Nov 4, 2014 Privacy & Big Data Overload Due to the evolution of personalized, data-driven digital marketing, companies now have infinite amounts of personally identifiable information (PII) about their customers—and it just keeps exponentially growing. In fact, according to the Pew Research Center, the volume of business data worldwide—across all companies—doubles every 1.2 years. But how should you use this data? And at what point does the information known about your consumers—and the ways you use this information—risk consumer privacy? Is there such thing as too much data? OTA Blog Newsletters Wed, Oct 22, 2014 Passage of Data Breach Legislation With the rapid surge in data breaches impacting millions of households this year, OTA was optimistic on the possible passage of data breach legislation. Unfortunately it is appearing very unlikely we will see any such legislation, driven in part by the partisan efforts and trade groups who are focused on protecting their business member's short-term interests and consumer advocates who appear to be unwilling to compreomise. OTA continues to be a voice of reason advocating a framework modeled off of CAN-SPAM and COPPA, providing businesses with clarity and ease of repor Wed, Oct 15, 2014 https://otalliance.org/resources/data-breach-protection 10/27/2014
  • 5. Data Breach & Protection | Online Trust Alliance Page 5 of 7 Sen Franken Calls DOJ to Shut Down Stalking Apps Sen. Al Franken is pushing the Justice Department to do more to protect smartphone users from "stalking apps" that surreptitiously track their targets. In a letter to U.S. Attorney General Eric Holder on Monday, Franken noted the department's work on the issue - including the recent indictment of a man who operated one spyware app, StealthGenie - but said it needs to go further. OTA supports this effort. Share your views and interest in signing on in support of this effort. Read more > Fri, Sep 26, 2014 Email Capture at Retail Point of Sale - Call for Best Practices As we head towards the holiday buying season and increasingly retailers are multi channel, questions regarding email collection at point of sale are being raised. Collection at time of purchase provides significant benefits to the retailer and done right the same for the consumer. That said, how can a consumer understand what and how the email is being used? What forms of notice are appropriate and is it reasonable a sales clerk can understand the nuances of data collection, transactional purposes and sharing with affiliate or unaffiliated third partie Thu, Sep 25, 2014 Rupert Murdoch's News Corp vs Google - A war of words The anxiety and class between major publishers and content providers vs dominate market players including Google is at an all time high. In News Corp's submission to the EU it asserts that Google is a “platform for piracy and the spread of malicious networks” and “a company that boasts about its ability to track traffic [but] chooses to ignore the unlawful and unsavory content that surfaces after the simplest of searches”. Share your thoughts and perspectives. Are such claims legitimate? See Resources Advertising Integrity & Fraud Data Breach & Protection Email Security & Integrity Malicious Threats Web and Mobile Security Educational Videos and Webinars Glossary https://otalliance.org/resources/data-breach-protection 10/27/2014
  • 6. Data Breach & Protection | Online Trust Alliance Page 6 of 7 Initiatives Brand Protection Data Privacy Day Identity Theft Online Trust Audit & Honor Roll Email Integrity Audit Privacy Public Policy Security Best Practices Committees News & Events OTA In The News Newsletters Press Releases Upcoming Events Recent Events Events Archive Membership Benefits History & Overview Member Levels Working Committees Donate About Us Members Members https://otalliance.org/resources/data-breach-protection 10/27/2014
  • 7. Data Breach & Protection | Online Trust Alliance Page 7 of 7 Board of Directors Non-Governmental Organizations Strategic Advisors Committees Staff Careers © 2014 Online Trust Alliance Home Subscribe Privacy Policy Contact Us Printer-friendly version https://otalliance.org/resources/data-breach-protection 10/27/2014