Customer Convenience Or Surveillance Society?
Amazon’s new high-tech store opened recently. It has no checkout and no cashiers. Instead, it relies on the latest visual recognition and Internet of Things technology to track what you’re taking from...
View ArticleThe Digital Golden Rule: Treat People Online As You’d Treat Them Offline
I was chatting with my colleague Johann the other day, and we were trying to define what “consent” truly means. During that conversation, he equated online consent to the in-store shopping experience,...
View ArticleData Ownership: Next Big Data Threat And Opportunity
A little-noticed section of the recent EU General Data Privacy Regulation (GDPR) has the potential to fundamentally alter the underlying economics of the Internet. Buried under the frantic scramble for...
View ArticleTen Ways Small And Midsize Companies Can Strengthen Information Security
As cybercrime becomes increasingly sophisticated, security breaches at major corporations around the world are becoming quite commonplace. Just last year, the private information of 143 million Equifax...
View ArticleGDPR: What You Need To Know And What It Means For The Digital Economy
Part 4 in the “Postmodern CIO” series The deadline for enforcement of the European Union’s General Data Protection Regulation (GDPR) is only months away, with the agreement coming into effect on May...
View ArticleWhy GDPR Is A Helpful Catalyst For The Postmodern CIO
Part 7 and final blog in the “Postmodern CIO” series The EU’s new General Data Protection Regulation (GDPR) is a catastrophe for old, immobile enterprises. By May 25, 2018, many large businesses will...
View ArticleTop 10 IT Trends, Part 2: Virtualization, Analytics, AI, And Data Governance
Part 2 of the “2018 Top IT Trends” series In my first blog in this series, I stated my case that adoption of Internet of Things (IoT) platforms will be the number-one technology trend of 2018. However,...
View ArticleGDPR: Why Should Your Business Care?
GDPR (General Data Protection Regulation) is the fundamental modernization of European data protection legislation, taking into consideration the digital data evolution over the last decades. It aims...
View ArticleA Simple Four-Pillar Approach To Structuring GDPR Programs
In a GDPR project or any data privacy-related enterprise project, there are many ways to start and structure it. We’ll find as many individual approaches as there are companies that are managing data...
View ArticleYour GDPR “Duties Of Proof” And Liability
In the typical application of legislation, one is assumed innocent until proven guilty. There are some exceptions; in many countries, health and safety is an example. Companies are assumed guilty...
View ArticleFirst Dogs, Now Employees: Are Microchips In Your Business’ Future?
When you attend festivals and events, you typically gain admission with a physical ticket, a lanyard, or a bracelet. But have you ever considered a chip implant? Leave it to the tech community to not...
View ArticleGDPR Before And After May 25
In just two months, the “big deadline” for European Union General Data Protection Regulation (GDPR) compliance is going to fall unyieldingly on businesses in Europe and around the world. That means...
View ArticleThe Sorry State Of GDPR Readiness – And How You Can Turn It Around
In the humdrum world of regulatory compliance, the European Union’s General Data Protection Regulation (GDPR) is equivalent to the storm of the century. An endless stream of forecasts has been warning...
View ArticleGDPR: Don’t Forget The Human Touch
If you’ve ever ridden a horse, you’ll be familiar with the phrase, “Dangerous at both ends and uncomfortable in the middle.” It applies just as well to the looming GDPR as it does to the equine world....
View ArticleEstablish Trust In The Digital Age
Oil had had many uses for centuries, but two primary innovations—electricity and the combustion engine—drove global demand for oil and its by-products to new heights. Like oil, innovations impacting...
View ArticleERP In The Cloud: A Key Deciding Factor For GDPR Compliance
The General Data Protection Regulation (GDPR) is sending shockwaves that go beyond its jurisdictional boundaries. It’s no secret that EU-based businesses will be profoundly impacted. But there’s still...
View ArticleWhy T&E Matters: Securing Spending Data
Part 3 of the five-part “T&E in the Cloud” series In the wake of recent massive and highly publicized data-breach security crises, everyone is talking about cybersecurity. And they’re no longer...
View ArticleFour Ways To Master Secure Customer Data Management
For businesses today, mastering secure customer data management is a key driver to get digital right. Managing customer data is critical to understanding each customer’s journey and history – from...
View ArticleGDPR: Data Protection Is Only The Tip Of The Iceberg
Part 1 of the “GDPR as Catalyst” series In the digital race to win new customers and keep existing ones, for the better part of the last two decades businesses have ignored customers’ individual...
View ArticleGDPR: A Way To Utilize Processes As Assets (Part 2)
Part 2 of the “GDPR as Catalyst” series The General Data Protection Regulation (GDPR) requires companies to understand how personal data flows through business processes and applications. While most...
View ArticleGDPR As Catalyst: Protect Data And Grow the Business (Part 4)
Part 4 of the “GDPR as Catalyst” series Businesses that support collaboration beyond their boundaries benefit greatly from improved innovation and productivity. But how do they enable their employees...
View ArticleYour Personal Data As A Consumer
How secure is your personal data? Have you ever been worried about how your personal data is used? Is your name and address “for sale” for new mailing lists, either physical or digital? The past In...
View ArticleInnovation Vs. Data Privacy Or Innovation And Data Privacy?
Nowadays, data security and customer satisfaction are increasingly gaining attention – in both the B2B and B2C segments. But what does this mean for companies when it comes to the handling of customer...
View ArticleHow To Build Trust Through Personalization
Consumers are conflicted, and rightly so. Study after study shows that they want – and expect – the convenience that comes from personalized experiences and simultaneously are worried about the...
View ArticleThe Chief Information Security Officer Is Not The Enemy
Part 3 in the Controls and Risk Management series A few days ago, I was having dinner with a friend who happens to be the chief information security officer (CISO) at a midsize software startup. While...
View Article
More Pages to Explore .....