HIGHLIGHTS OF THIS ISSUE
- Updates on India's privacy bill
- The "shaky state" of student privacy
- The ADPPA - how does it protect privacy?
- How to protect medical data privacy
INDUSTRY NEWS
India Withdraws Personal Data Protection Bill
Drawing uncertainty and scrutiny from various privacy advocates and tech giants, India has withdrawn its Personal Data Protection Bill. “This move comes as a surprise as lawmakers had indicated recently that the bill, unveiled in 2019, could see the 'light of day' soon enough.” Read more about the bill and why it’s being reconsidered here.
Over a million current and former students from schools across the United States have had their data leaked “after a recent cyberattack on Illuminate Education, a leading provider of student-tracking software.” This breach showcases the lax safeguards around student privacy. As one concerned parent puts it, “If you’re a bad student and had disciplinary problems and that information is now out there, how do you recover from that? It’s your future. It’s getting into college, getting a job. It’s everything.” Learn more here.
HIPAA in Breach? Meta Sued For Violating Patient Privacy
33 of the top 100 hospitals in the United States use the Meta Pixel to track visitors on their websites and feed that data to Facebook and Instagram for targeted ads. This practice brings up concerns over patient privacy and consent. Does it violate medical privacy laws? Learn more about this potential HIPAA breach and read the full complaints here.
How Does the ADPPA Protect Privacy?
The American Data Privacy and Protection Act (ADPPA) is making its way through the United States Congress and getting closer to becoming law. But, what does this mean? What is the core of the ADPPA, and will it protect consumer privacy? Learn more about the new potential law here.
How to Protect Medical Data Privacy
“When the US Supreme Court overturned the landmark 1973 Roe v. Wade decision last month..it immediately raised the stakes on medical data privacy for individuals and their employers.” Learn the best practices for how to protect the privacy of your consumers’ sensitive medical data here.
DATA VAULTS
Does Hashing Sensitive Customer Data Protect Privacy?
Hashing is a powerful tool, but when it comes to protecting customer PII, does hashing make sense? In this blog, learn about the problems that hashing solves, but also why it falls short as a viable solution for secure storage of sensitive customer data, and why it fails as a data privacy solution. Learn more here.
Accelerate Innovation with a Privacy by Design Approach
As privacy becomes more important for both B2B and B2C businesses, the ‘privacy by design’ approach puts privacy considerations at the beginning of the product development process, allowing you to plan without undue fear of last-minute concerns from well-meaning coworkers, or, much worse, leaving your company vulnerable to a data breach. Learn more about privacy by design here.
EVENTS
Stay up to date on all things data privacy with these upcoming events:
fintech_devcon: August 23-25, Denver, CO. Join Sean Falconer's talk "Enabling data privacy, payments, and analytics with an API"
Webinar: Move Fast and Don't Break Privacy: August 31, 10am PT. Online. Register today here.
SaaStr Annual: September 13-15, San Francisco, CA.
Infobip Shift: September 19-20, Zadar, Croatia. Join Sean Falconer's talk "Isolate and Protect Instead of Protecting In-Place"
IAPP Privacy, Security, Risk: October 13-14, Austin, TX.
Gartner IT Symposium: October 17-20, Orlando, FL.
TechCrunch Disrupt: October 18-20, San Francisco, CA.
WE'RE GROWING, COME JOIN US!
Are you passionate about tackling the ever-growing data privacy problem? So are we. Check out our open roles, and if they aren't a fit for you, please share with your network!
- Developer Advocate (anywhere)
- Product Marketing (anywhere)
- Account Executive (anywhere)
- Senior Product Manager, Skyflow Connections (anywhere)
- Head of Engineering, U.S. (Palo Alto, CA - remote)
ASK US ANYTHING
Curious about data privacy? Have a question about polymorphic encryption? Reply to this email with any pressing questions you have for us and we'll get back to you ASAP. We might even include your questions (and our answer) in the following newsletter.