<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>By Frank Fazzio Archives - Zasio</title>
	<atom:link href="https://zasio.com/category/frank/feed/" rel="self" type="application/rss+xml" />
	<link>https://zasio.com/category/frank/</link>
	<description>Digital Records Management Software</description>
	<lastBuildDate>Fri, 27 Jun 2025 14:23:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://zasio.com/wp-content/uploads/2023/05/cropped-zasiopurplefavicon-32x32.png</url>
	<title>By Frank Fazzio Archives - Zasio</title>
	<link>https://zasio.com/category/frank/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Understanding the New Colorado Privacy Act Amendment on Precise Geolocation Data</title>
		<link>https://zasio.com/colorado-privacy-act-precise-geolocation/</link>
					<comments>https://zasio.com/colorado-privacy-act-precise-geolocation/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Tue, 24 Jun 2025 17:16:09 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Frank Fazzio]]></category>
		<category><![CDATA[Colorado]]></category>
		<category><![CDATA[Colorado Privacy Act]]></category>
		<category><![CDATA[privacy]]></category>
		<guid isPermaLink="false">https://zasio.com/?p=6885</guid>

					<description><![CDATA[<p>Colorado recently enacted an amendment to the Colorado Privacy Act (CPA), designating “precise” geolocation data as sensitive personal data. Since its passage in 2021, the CPA has positioned Colorado as a leader among the growing number of states enshrining privacy protections into comprehensive privacy laws. With this amendment, Colorado has further strengthened and refined privacy protections for Colorado consumers to keep pace with new digital technological and legal developments. The state joins the trend of states defining precise geolocation information (i.e., any information enabling a person to be located within 1,850 feet) and classifying it as sensitive personal data. As consumers increasingly rely on technology in every facet of their lives, they leave behind a widening digital trail revealing their preferences, habits, and routines. Among the most significant of these is location data (whether precise or general), which is particularly sensitive because it tracks a person’s daily movements, offering insight into their lives. Businesses use this information for targeted marketing, but others may use it to monitor a person’s activities. For someone wishing to learn as much as possible about a person, location data is among the most valuable types of information. It reveals a person’s daily comings and goings. A favored route for [&#8230;]</p>
<p>The post <a href="https://zasio.com/colorado-privacy-act-precise-geolocation/" data-wpel-link="internal">Understanding the New Colorado Privacy Act Amendment on Precise Geolocation Data</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Colorado recently enacted an amendment to the Colorado Privacy Act (CPA), designating “precise” geolocation data as sensitive personal data. Since its passage in 2021, the CPA has positioned Colorado as a leader among the growing number of states enshrining privacy protections into comprehensive privacy laws.</p>
<p>With this amendment, Colorado has further strengthened and refined privacy protections for Colorado consumers to keep pace with new digital technological and legal developments. The state joins the trend of states defining precise geolocation information (i.e., any information enabling a person to be located within 1,850 feet) and classifying it as sensitive personal data.</p>
<p>As consumers increasingly rely on technology in every facet of their lives, they leave behind a widening digital trail revealing their preferences, habits, and routines. Among the most significant of these is location data (whether precise or general), which is particularly sensitive because it tracks a person’s daily movements, offering insight into their lives. Businesses use this information for targeted marketing, but others may use it to monitor a person’s activities.</p>
<p>For someone wishing to learn as much as possible about a person, location data is among the most valuable types of information. It reveals a person’s daily comings and goings. A favored route for a morning run, a habitual place to eat lunch, or a dinner at a romantic partner’s home are just a few examples. But malicious actors can also use location data for exploitative purposes, such as stalking or extortion. That’s why the CPA now explicitly bans controllers from selling sensitive data, including precise geolocation data, unless they first obtain the consumer’s affirmative consent.</p>
<h3>The Importance of Protecting Location Data</h3>
<p>Recognizing the significance of this information, most state privacy laws, including Colorado’s CPA amendment, designate “precise” geolocation data as a sensitive personal data type that requires heightened safeguards and protections to stop misuse or unauthorized access.</p>
<p>For businesses and public agencies in Colorado, the CPA’s change likely has significant implications. Any processing of precise geolocation data, including transfers or sharing, now requires explicit consumer consent.</p>
<p>The law’s broad scope includes “derived” information (data that can infer a person’s whereabouts or activities). This includes data from Wi-Fi networks, cellular towers, Bluetooth devices, IP addresses, and many others that help identify a person’s location. Other peripheral categories of data may also come under scrutiny if they can reveal someone’s location, such as purchase and transaction data, online behavior, and social media activity.</p>
<h3>Evolving Landscape of Privacy Laws and Best Practices</h3>
<p>Expect to see the contours of location data protections continue to evolve in the coming years. States with comprehensive privacy laws are sure to incrementally refine their approaches to protecting personal data. They may also gradually become more uniform by copying provisions from each other that have proven popular. Meanwhile, the growing body of enforcement actions and court decisions will shape a clearer set of principles and best practices for personal data management and protection that businesses can follow.</p>
<p><strong><em>Note:</em></strong></p>
<p>The CPA amendment, <a href="https://leg.colorado.gov/sites/default/files/documents/2025A/bills/2025a_276_enr.pdf" data-wpel-link="external" rel="external noopener noreferrer">SB25-276</a>, adds language that defines “precise” geolocation data as sensitive, which includes any data allowing a person’s whereabouts to be determined to within a broad radius of 1,850 feet. Specifically, <a href="https://leg.colorado.gov/sites/default/files/documents/2025A/bills/2025a_276_enr.pdf" data-wpel-link="external" rel="external noopener noreferrer">SB25-276</a><a href="#_ftn1" name="_ftnref1">[i]</a> defines “precise geolocation data” as “information derived from technology that accurately identifies the present or past location of a device that links or is linkable to an individual within a radius of one thousand eight hundred fifty feet… [and] includes: (i) global positioning system (gps) coordinates within a radius of one thousand eight hundred fifty feet; or (ii) any data derived from a device and that is used or intended to be used to locate a consumer within a geographic area within a radius of one thousand eight hundred fifty feet.”</p>
<p>This roughly tracks the definition provided in California Consumer Privacy Act (CCPA), which also specifies 1,850 feet (about six football fields). It also excludes communication content or any data from advanced utility meeting systems.</p>
<p><a href="#_ftnref1" name="_ftn1">[i]</a> https://leg.colorado.gov/sites/default/files/documents/2025A/bills/2025a_276_enr.pdf</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on information governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p>&nbsp;</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fcolorado-privacy-act-precise-geolocation%2F&amp;linkname=Understanding%20the%20New%20Colorado%20Privacy%20Act%20Amendment%20on%20Precise%20Geolocation%20Data" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fcolorado-privacy-act-precise-geolocation%2F&amp;linkname=Understanding%20the%20New%20Colorado%20Privacy%20Act%20Amendment%20on%20Precise%20Geolocation%20Data" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fcolorado-privacy-act-precise-geolocation%2F&amp;linkname=Understanding%20the%20New%20Colorado%20Privacy%20Act%20Amendment%20on%20Precise%20Geolocation%20Data" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fcolorado-privacy-act-precise-geolocation%2F&#038;title=Understanding%20the%20New%20Colorado%20Privacy%20Act%20Amendment%20on%20Precise%20Geolocation%20Data" data-a2a-url="https://zasio.com/colorado-privacy-act-precise-geolocation/" data-a2a-title="Understanding the New Colorado Privacy Act Amendment on Precise Geolocation Data" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/colorado-privacy-act-precise-geolocation/" data-wpel-link="internal">Understanding the New Colorado Privacy Act Amendment on Precise Geolocation Data</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/colorado-privacy-act-precise-geolocation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Understanding President Biden&#8217;s Executive Order on Sensitive Personal Data</title>
		<link>https://zasio.com/understanding-president-bidens-executive-order-on-sensitive-personal-data/</link>
					<comments>https://zasio.com/understanding-president-bidens-executive-order-on-sensitive-personal-data/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Tue, 19 Mar 2024 15:25:37 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Frank Fazzio]]></category>
		<guid isPermaLink="false">https://zasio.com/?p=4178</guid>

					<description><![CDATA[<p>On Feb. 28, 2024, the Biden administration issued a new executive order fortifying protections for the sensitive personal data of Americans and mitigating the risk of exploitation by foreign adversaries. This directive holds substantial implications for global enterprises, particularly those with extensive international operations. Under the EO, key government departments, including Justice, Homeland Security, Health and Human Services, Defense, Veterans Affairs, and the Consumer Financial Protection Bureau, are tasked with executing various provisions of the order. These provisions encompass regulating access to government-related data, establishing security standards to prevent unauthorized dissemination of Americans’ data, and mandating federal contractors and grant recipients safeguard data from certain nations. In light of the EO, companies should anticipate guidelines and standards governing the processing, transfer, and security of sensitive personal data types such as genomic, biometric, health, geolocation, and financial data. Entities involved in data brokering or bulk data aggregation with overseas transfers may face substantial operational impacts. The significance of preventing sensitive personal data proliferation cannot be overstated, especially concerning Americans&#8217; financial security. Sensitive data often enables cybercrimes, including scams and theft. The broader the availability of information, the more avenues for exploitation exist for malicious actors to harm individuals or entities. Although [&#8230;]</p>
<p>The post <a href="https://zasio.com/understanding-president-bidens-executive-order-on-sensitive-personal-data/" data-wpel-link="internal">Understanding President Biden&#8217;s Executive Order on Sensitive Personal Data</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On Feb. 28, 2024, the Biden administration issued a new executive order fortifying protections for the sensitive personal data of Americans and mitigating the risk of exploitation by foreign adversaries. This directive holds substantial implications for global enterprises, particularly those with extensive international operations.</p>
<p>Under the EO, key government departments, including Justice, Homeland Security, Health and Human Services, Defense, Veterans Affairs, and the Consumer Financial Protection Bureau, are tasked with executing various provisions of the order. These provisions encompass regulating access to government-related data, establishing security standards to prevent unauthorized dissemination of Americans’ data, and mandating federal contractors and grant recipients safeguard data from certain nations.</p>
<p>In light of the EO, companies should anticipate guidelines and standards governing the processing, transfer, and security of sensitive personal data types such as genomic, biometric, health, geolocation, and financial data. Entities involved in data brokering or bulk data aggregation with overseas transfers may face substantial operational impacts.</p>
<p>The significance of preventing sensitive personal data proliferation cannot be overstated, especially concerning Americans&#8217; financial security. Sensitive data often enables cybercrimes, including scams and theft. The broader the availability of information, the more avenues for exploitation exist for malicious actors to harm individuals or entities.</p>
<p>Although China and Russia are highlighted as key countries of concern, the global reach and intricate commercial and political networks of these nations imply that the effects of the order will be impactful on a wide geographic scale.</p>
<p>Organizations should proactively prepare to update their information management programs, IT security controls, contracts, procurement processes, and data transfer protocols once the regulations are finalized. For instance, security audits and penetration tests can spot system vulnerabilities. Program maturity assessments help understand deficiencies that, once resolved, free up resources for future challenges. Information collection initiatives identify personal data assets and cross-border data transfers that could face new regulations. Regular maintenance of recordkeeping and information management policies makes future updates more efficient and less disruptive.</p>
<p>By taking steps to strengthen their information governance programs and integrate personal data management into policies, programs, and processes, organizations can better protect the sensitive personal data of their customers, employees, and stakeholders, better ensuring robust protection against emerging threats and regulatory requirements.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Funderstanding-president-bidens-executive-order-on-sensitive-personal-data%2F&amp;linkname=Understanding%20President%20Biden%E2%80%99s%20Executive%20Order%20on%20Sensitive%20Personal%20Data" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Funderstanding-president-bidens-executive-order-on-sensitive-personal-data%2F&amp;linkname=Understanding%20President%20Biden%E2%80%99s%20Executive%20Order%20on%20Sensitive%20Personal%20Data" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Funderstanding-president-bidens-executive-order-on-sensitive-personal-data%2F&amp;linkname=Understanding%20President%20Biden%E2%80%99s%20Executive%20Order%20on%20Sensitive%20Personal%20Data" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Funderstanding-president-bidens-executive-order-on-sensitive-personal-data%2F&#038;title=Understanding%20President%20Biden%E2%80%99s%20Executive%20Order%20on%20Sensitive%20Personal%20Data" data-a2a-url="https://zasio.com/understanding-president-bidens-executive-order-on-sensitive-personal-data/" data-a2a-title="Understanding President Biden’s Executive Order on Sensitive Personal Data" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/understanding-president-bidens-executive-order-on-sensitive-personal-data/" data-wpel-link="internal">Understanding President Biden&#8217;s Executive Order on Sensitive Personal Data</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/understanding-president-bidens-executive-order-on-sensitive-personal-data/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Staying One Step Ahead of Cyber Criminals: NYDFS Updating Cybersecurity Regulation for 2023</title>
		<link>https://zasio.com/cyber-security-nydfas-privacy-security-zasio/</link>
					<comments>https://zasio.com/cyber-security-nydfas-privacy-security-zasio/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Mon, 01 May 2023 18:15:52 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Frank Fazzio]]></category>
		<category><![CDATA[Frank Fazzio]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[privacy laws]]></category>
		<category><![CDATA[RIM]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=333</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/cyber-security-nydfas-privacy-security-zasio/" data-wpel-link="internal">Staying One Step Ahead of Cyber Criminals: NYDFS Updating Cybersecurity Regulation for 2023</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Since 2017, the New York Department of Financial Services (NYDFS) cybersecurity regulation has established minimum cybersecurity requirements for financial services companies that are licensed or registered by NYDFS. The regulation is set to be updated<a href="https://www.zasio.com/cyber-security-nydfas-privacy-security-zasio/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a> in 2023 to address the ever-increasing sophistication and scope of cyber threats. NYDFS issued a draft regulation last November, and the public comment period ended on Jan. 9. NYDFS is currently reviewing those comments, and a final rule is expected later this year.</p>
<p>Just like California’s emissions regulations’ far-reaching impact on the national auto industry, the cybersecurity regulation has altered the information security practices of financial services companies both domestically and, due to the global reach of the U.S. financial system, internationally. There’s little doubt the updated regulation will have the same effect.</p>
<p>Effective information governance plays a crucial role in complying with the NYDFS cybersecurity rules by managing the storage, maintenance, and retention of sensitive information. This article explores the most relevant updates to the NYDFS cybersecurity rules for records management professionals.</p>
<h2>Company Risk Tiers</h2>
<p>The proposed updated NYDFS cybersecurity regulation establishes three tiers of companies (previously, there were two) with targeted requirements tailored to the unique security needs of financial institutions of varying sizes. A new “Class A” designation applies to companies with at least $20 million in gross annual revenue in New York, $1 billion in gross annual revenue globally, and more than 2,000 employees. The proposal raises the threshold for the lowest tier to exempt companies with fewer than 20 personnel (previously, 10) and less than $15 million in assets (previously, $10 million).</p>
<h2>Strengthened Controls</h2>
<p>Although the current regulation requires robust cybersecurity policies and procedures, the proposed revision will require an even more comprehensive approach. The proposed revision would specifically cover data retention and device end-of-life management, remote access, security monitoring, security awareness and training, incident notification, and vulnerability management. Regulated entities would also need a comprehensive and continuously updated inventory of information assets, with detailed information about ownership, controls, sensitivity levels, support, and recovery time requirements.</p>
<p>The existing regulation already required user access to be appropriately limited. Under the proposed revision, however, these limitations would need to be significantly more detailed. For example, access privileges could not exceed those required to fulfill job responsibilities and privileged accounts could be used only when necessary. Also, regulated companies would need to review privileges at least annually, configure remote access protocols securely, and withdraw an employee’s access swiftly following their departure. Further, multi-factor authentication would be broadly required, rather than merely recommended, for remote access to company information systems, third-party applications, and all privileged accounts that do not already have equivalent or more stringent controls.</p>
<p>Additionally, Class A companies must use automated methods to prohibit commonly used passwords and employ a dedicated privileged access management solution. Moreover, Class A companies would need to conduct an annual independent audit of their cybersecurity program and engage external experts for a full risk assessment every three years.</p>
<h2>Increased Governance &amp; Accountability</h2>
<p>The updates also extend to company governance. A company’s board of directors or similar governing body, if it has one, would need to oversee and direct the company’s cybersecurity risk management, require executives to develop an appropriate cybersecurity program, and obtain sufficient knowledge to conduct oversight effectively, including, if necessary, by hiring experts. Executives must review and approve cybersecurity policies annually.</p>
<p>Financial institutions were already required to have a chief information security officer (“CISO”); that individual must now have the authority to direct resources to ensure cybersecurity risks are appropriately managed. Companies also must require the CISO to report any material issues to the governing body.</p>
<h2>Enhanced Risk Assessments &amp; Incident Planning</h2>
<p>Risk assessments and preparedness are another area of the regulation that is set to expand. The regulation currently directs companies to establish a cybersecurity incident response plan that outlines steps to take in the event of a breach. That plan must now be proactive, with measures to investigate and mitigate incidents and ensure operational resilience via incident response, business continuity, and disaster recovery planning and identify and memorialize measures to mitigate the risk of breach and ensure operational resilience.</p>
<p>For example, companies must now conduct a penetration test that specifically covers internal and external attack vectors from both inside and outside the information systems’ boundaries, and develop automated scans or manual reviews to discover, analyze, and report on potential vulnerabilities. Under the proposed revision, companies should also establish a monitoring process that promptly notifies them of security vulnerabilities, remediates them, and documents material issues.</p>
<p>Records management professionals must work with their IT and security teams to develop plans that address each of these components for the information repositories they oversee and their role in the event of a security incident. This includes identifying the type of information that has been compromised, determining the extent of the breach and whether sensitive information is impacted, and reporting the breach to the appropriate authorities.</p>
<h2>Recordkeeping and Records Management Professionals</h2>
<p>As with any regulation, compliance cannot stop at implementation; it must also be well-documented. The current regulation requires companies to maintain records of their cybersecurity program and activities for at least five years. Under the proposed update, the scope of those records will increase. Records management professionals must ensure that these records are maintained in a secure and accessible manner. Companies must ensure that they have in place adequate policies and procedures for the storage, maintenance, and retention of cybersecurity records. Records also must be readily accessible to authorized parties and protected against unauthorized access, alteration, or destruction.</p>
<h2>Conclusion</h2>
<p>The updates to the NYDFS cybersecurity regulation further develop the minimum cybersecurity requirements for financial services companies that are licensed or registered by NYDFS. Records management professionals play a critical role in complying with the regulation by ensuring that sensitive information is properly protected, incident response plans are in place, and records are properly maintained and protected. By collaborating with other teams, especially IT and security, to develop and implement cybersecurity and related policies and procedures, records management professionals can help their companies satisfy NYDFS cybersecurity requirements and better protect sensitive information from cyber threats.</p>
<p><a href="https://www.zasio.com/cyber-security-nydfas-privacy-security-zasio/#_ftnref1" name="_ftn1" data-wpel-link="internal">[1]</a> https://dfs.ny.gov/system/files/documents/2022/10/rp23a2_text_20221109_0.pdf</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_0 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img decoding="async" src="https://cdn.zasio.com/wp-content/uploads/2023/05/Frank-01-96x96-1.png" alt="Author: Frank Fazzio, IGP, CRM" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Frank Fazzio, IGP, CRM</h4>
					<p class="et_pb_member_position">Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fcyber-security-nydfas-privacy-security-zasio%2F&amp;linkname=Staying%20One%20Step%20Ahead%20of%20Cyber%20Criminals%3A%20NYDFS%20Updating%20Cybersecurity%20Regulation%20for%202023" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fcyber-security-nydfas-privacy-security-zasio%2F&amp;linkname=Staying%20One%20Step%20Ahead%20of%20Cyber%20Criminals%3A%20NYDFS%20Updating%20Cybersecurity%20Regulation%20for%202023" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fcyber-security-nydfas-privacy-security-zasio%2F&amp;linkname=Staying%20One%20Step%20Ahead%20of%20Cyber%20Criminals%3A%20NYDFS%20Updating%20Cybersecurity%20Regulation%20for%202023" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fcyber-security-nydfas-privacy-security-zasio%2F&#038;title=Staying%20One%20Step%20Ahead%20of%20Cyber%20Criminals%3A%20NYDFS%20Updating%20Cybersecurity%20Regulation%20for%202023" data-a2a-url="https://zasio.com/cyber-security-nydfas-privacy-security-zasio/" data-a2a-title="Staying One Step Ahead of Cyber Criminals: NYDFS Updating Cybersecurity Regulation for 2023" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/cyber-security-nydfas-privacy-security-zasio/" data-wpel-link="internal">Staying One Step Ahead of Cyber Criminals: NYDFS Updating Cybersecurity Regulation for 2023</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/cyber-security-nydfas-privacy-security-zasio/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>California Privacy Rights Act (CPRA) Prep Workshop</title>
		<link>https://zasio.com/california-privacy-rights-act-cpra-prep-workshop/</link>
					<comments>https://zasio.com/california-privacy-rights-act-cpra-prep-workshop/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Tue, 05 Jul 2022 22:00:28 +0000</pubDate>
				<category><![CDATA[By Frank Fazzio]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[California Privacy Protection Agency]]></category>
		<category><![CDATA[California Privacy Rights Act]]></category>
		<category><![CDATA[CPPA]]></category>
		<category><![CDATA[CPRA]]></category>
		<category><![CDATA[CPRA Preparation]]></category>
		<category><![CDATA[Frank Fazzio]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=415</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/california-privacy-rights-act-cpra-prep-workshop/" data-wpel-link="internal">California Privacy Rights Act (CPRA) Prep Workshop</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">The California Privacy Rights Act (“CPRA”) compliance deadline is fast approaching. Is your house in order? Don’t let the CPRA’s January 1, 2023, implementation date or the July 1, 2023, enforcement date sneak up on you! If you’re like many of our clients, you’ve heard a lot about the passage of the CPRA. You may have also heard about the CPRA’s new draft regulations approved in June by the new California Privacy Protection Agency (“CPPA”). These regulations are poised to significantly expand and codify privacy rights and procedures for a wide range of businesses that handle the personal data of California consumers.</p>
<p>If you haven’t prepared yet, don’t sweat: there’s still time to get ready. And even though specific compliance requirements under CPRA regulations remain in draft form, you can still take concrete steps today to get ready. There’s no reason to put CPRA compliance on the back burner until the regulations are finalized.</p>
<p>Join Zasio’s Frank Fazzio, CIPP-US / IGP / CRM for a workshop webinar on tackling the most high-priority items on the CPRA compliance checklist so that your organization can avoid a last-minute scramble as the deadlines approach. The presentation will cover:</p>
<p>– Conducting a Personal Information Inventory<br />
– Identifying Sensitive Personal Information<br />
– Setting Personal Information Retention Policies<br />
– Policies, Consumer Notices, Opt-Outs<br />
– Responding to Consumer Requests (Deletion, Correction, Information)<br />
– IT Security Precautions</p>
<p>Take the stress out of CPRA compliance prep with Zasio. We’ll see you there!</p>
<p><strong>CPRA Prep Workshop</strong><br />
<strong>Date: </strong>August 10, 2022<br />
<strong>Time: </strong>1:00 P.M. MT<br />
<strong>Cost:</strong> Free</p>
<p>&nbsp;</p>
<p><a href="" class="small-button smallorange" data-wpel-link="internal">Register for Workshop</a></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_1 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2023/05/Frank-01-96x96-1.png" alt="Author: Frank Fazzio, IGP, CRM" class="wp-image-1966" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Frank Fazzio, IGP, CRM</h4>
					<p class="et_pb_member_position">Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fcalifornia-privacy-rights-act-cpra-prep-workshop%2F&amp;linkname=California%20Privacy%20Rights%20Act%20%28CPRA%29%20Prep%20Workshop" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fcalifornia-privacy-rights-act-cpra-prep-workshop%2F&amp;linkname=California%20Privacy%20Rights%20Act%20%28CPRA%29%20Prep%20Workshop" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fcalifornia-privacy-rights-act-cpra-prep-workshop%2F&amp;linkname=California%20Privacy%20Rights%20Act%20%28CPRA%29%20Prep%20Workshop" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fcalifornia-privacy-rights-act-cpra-prep-workshop%2F&#038;title=California%20Privacy%20Rights%20Act%20%28CPRA%29%20Prep%20Workshop" data-a2a-url="https://zasio.com/california-privacy-rights-act-cpra-prep-workshop/" data-a2a-title="California Privacy Rights Act (CPRA) Prep Workshop" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/california-privacy-rights-act-cpra-prep-workshop/" data-wpel-link="internal">California Privacy Rights Act (CPRA) Prep Workshop</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/california-privacy-rights-act-cpra-prep-workshop/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Virginia’s New CCPA-style Privacy Law: Powerhouse or Paper Tiger?</title>
		<link>https://zasio.com/virginias-new-ccpa-style-privacy-law-powerhouse-or-paper-tiger/</link>
					<comments>https://zasio.com/virginias-new-ccpa-style-privacy-law-powerhouse-or-paper-tiger/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Thu, 04 Mar 2021 21:16:29 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Frank Fazzio]]></category>
		<category><![CDATA[CCPA]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Frank Fazzio]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[law]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[privacy law]]></category>
		<category><![CDATA[privacy legislation]]></category>
		<category><![CDATA[VCPDA]]></category>
		<category><![CDATA[Virginia law]]></category>
		<category><![CDATA[Virginia’s Privacy Law]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=570</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/virginias-new-ccpa-style-privacy-law-powerhouse-or-paper-tiger/" data-wpel-link="internal">Virginia’s New CCPA-style Privacy Law: Powerhouse or Paper Tiger?</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Virginia has just become the second U.S. state to enact a comprehensive privacy protection law. After passage by overwhelming majorities in both the Virginia Senate and House of Delegates, the Virginia Consumer Data Protection Act<a href="https://www.zasio.com/virginias-new-ccpa-style-privacy-law-powerhouse-or-paper-tiger/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a> (“VCDPA”) was signed into law by Governor Ralph Northam on March 2. While lawmakers in several other states like New York and Washington have proposed their own privacy bills, those efforts so far have hit various snags and stumbling blocks while winding their way through the legislative process that has thus far stalled their final passage into law.</p>
<p><strong>Growing Trend of State-level Privacy Laws</strong></p>
<p>The VCDPA is now the first broad state-level privacy law enacted since California’s CCPA. However, it is just the latest in the ongoing push among states to pass their own privacy legislation, spurred by the absence of any federal privacy legislation on par with the EU’s GDPR. It remains to be seen whether the resulting patchwork of state laws can effectively substitute the need for a comprehensive federal privacy law. As a sign that it may not, the VCDPA’s enforcement mechanisms invite concern that the law may not be tough enough to meaningfully change company behavior.</p>
<p><strong>Numerous CCPA &amp; GDPR Similarities, Some New Features</strong></p>
<p>The VCPDA borrows many of the same key principles as California’s CCPA and the European Union’s GDPR. For example, it relies on a similarly expansive definition of personal data that includes any data or information that can be linked to an “identified or identifiable natural person” and carves out sanitized de-identified data. It also contains a similar bill of individual rights that includes the right to:</p>
<ul>
<li>know what personal data is being processed;</li>
<li>correct or delete that data;</li>
<li>obtain a portable copy of personal data;</li>
<li>opt-out from having your personal data sold.</li>
</ul>
<p>The VCDPA is applicable to any company that does business in Virginia or serves Virginia consumers (defined as natural persons residing in Virginia and acting in a non-commercial and non-employment capacity) and processes over 100,000 consumers’ data. This figure decreases to 25,000 consumers if a company earns over 50% of its gross revenue from selling personal data. This is similar to the CCPA’s standard of 50,000 consumers or 50% of revenue from selling personal data. However, while the CCPA has a monetary trigger that brings any company with gross revenue of at least $25 million under its purview, the VCPDA has no monetary trigger, which will allow some companies earning over $25m to avoid compliance.</p>
<p>The VCPDA also requires a person’s affirmative consent (known as an “opt-in”) before a company can process sensitive data. Under the VCPDA, sensitive data is defined as data showing racial or ethnic origin, religious beliefs, mental/physical health diagnosis, sexual orientation, immigration status, genetic or biometric data, data collected from minors, and precise geolocation data. In contrast to the CCPA, a person’s opt-in under the VCPDA is required regardless of whether personal data is being sold.</p>
<p>A novel feature under the VCPDA is the requirement that controllers conduct a precautionary data protection assessment of any IT systems processing personal data for targeted advertising, sale of personal data, consumer profiling, or systems containing sensitive personal data or data that might cause a heightened risk of harm to the consumer. These checks will add another layer of defenses to help protect against the ever-intensifying efforts of cybercriminals.</p>
<p><strong>Light-Touch Enforcement &amp; Penalties for Opt-Outs</strong></p>
<p>The VCPDA departs significantly from the CCPA’s formula for privacy regulation by not including any private right of action. Under the VCPDA, individual consumers who have been harmed by non-compliance will not be able to personally sue for civil damages. Instead, the law will be enforced exclusively by the Virginia attorney general’s office, which will have the power to levy fines of up to $7,500 per violation. But like the CCPA, offenders can cure any violations during a 30-day period to avoid paying a fine.</p>
<p>Also, under the CCPA, lawyers can band together hundreds or thousands of CCPA-affected Californians to form class action lawsuits against an offending company, and collectively seek millions of dollars in damages. This serves as a major deterrent against non-compliance. In contrast, under the VCDPA, the class action lawsuit threat is not present. Further still, crafting a lawsuit requires a significant amount of time and expense to organize, but a curative action undertaken within thirty days can completely negate the lawsuit and make it disappear. This would tend to strongly disincentivize lawsuits and blunt the VCDPA’s enforcement heft.</p>
<p>Another key difference between the CCPA and VCDPA is while both laws prohibit overt discrimination against consumers who exercise their opt-out rights (a company cannot change the rates, prices, or quality of goods and services that are offered to a consumer), it <em>explicitly</em> allows this kind of discrimination when the consumer’s choice prevents them from getting targeted advertising or from enrolling in a voluntary loyalty program. In other words, if processing or selling a consumer’s personal data is a prerequisite to participating in a company’s loyalty rewards program or targeted marketing, an opt-out can potentially leave consumers out in the cold on special prices or promotional offers that their less privacy-conscious peers may enjoy.</p>
<p>Taken as a whole, the VCDPA reveals a markedly different and more permissive enforcement landscape for companies when compared to the CCPA. The VCDPA is set to go into effect on January 1, 2023.</p>
<p><strong>Conclusion</strong></p>
<p>Once two states have taken the plunge by enacting big-ticket privacy laws, expect that others will surely follow. Presently, more than a dozen states continue to work on their own privacy laws. As more states pass privacy laws with their own eccentricities, the growing complexity caused by an overlapping patchwork of state requirements may increase pressure on Congress to set a baseline to which all personal data processors must adhere. With single-party control of the White House and both houses of Congress, the likelihood of passing comprehensive federal privacy legislation now may be greater than ever.</p>
<p><a href="https://www.zasio.com/virginias-new-ccpa-style-privacy-law-powerhouse-or-paper-tiger/#_ftnref1" name="_ftn1" data-wpel-link="internal">[1]</a> <a href="https://lis.virginia.gov/cgi-bin/legp604.exe?211+ful+SB1392+pdf" data-wpel-link="external" rel="external noopener noreferrer">https://lis.virginia.gov/cgi-bin/legp604.exe?211+ful+SB1392+pdf</a></p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_2 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2023/05/Frank-01-96x96-1.png" alt="Author: Frank Fazzio, IGP, CRM" class="wp-image-1966" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Frank Fazzio, IGP, CRM</h4>
					<p class="et_pb_member_position">Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fvirginias-new-ccpa-style-privacy-law-powerhouse-or-paper-tiger%2F&amp;linkname=Virginia%E2%80%99s%20New%20CCPA-style%20Privacy%20Law%3A%20Powerhouse%20or%20Paper%20Tiger%3F" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fvirginias-new-ccpa-style-privacy-law-powerhouse-or-paper-tiger%2F&amp;linkname=Virginia%E2%80%99s%20New%20CCPA-style%20Privacy%20Law%3A%20Powerhouse%20or%20Paper%20Tiger%3F" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fvirginias-new-ccpa-style-privacy-law-powerhouse-or-paper-tiger%2F&amp;linkname=Virginia%E2%80%99s%20New%20CCPA-style%20Privacy%20Law%3A%20Powerhouse%20or%20Paper%20Tiger%3F" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fvirginias-new-ccpa-style-privacy-law-powerhouse-or-paper-tiger%2F&#038;title=Virginia%E2%80%99s%20New%20CCPA-style%20Privacy%20Law%3A%20Powerhouse%20or%20Paper%20Tiger%3F" data-a2a-url="https://zasio.com/virginias-new-ccpa-style-privacy-law-powerhouse-or-paper-tiger/" data-a2a-title="Virginia’s New CCPA-style Privacy Law: Powerhouse or Paper Tiger?" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/virginias-new-ccpa-style-privacy-law-powerhouse-or-paper-tiger/" data-wpel-link="internal">Virginia’s New CCPA-style Privacy Law: Powerhouse or Paper Tiger?</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/virginias-new-ccpa-style-privacy-law-powerhouse-or-paper-tiger/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Personal Data Transfers Post-Privacy Shield</title>
		<link>https://zasio.com/personal-data-transfers-post-privacy-shield/</link>
					<comments>https://zasio.com/personal-data-transfers-post-privacy-shield/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 20:34:01 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Frank Fazzio]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[European Court of Justice]]></category>
		<category><![CDATA[Frank Fazzio]]></category>
		<category><![CDATA[US-EU Privacy Shield Agreement]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=693</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/personal-data-transfers-post-privacy-shield/" data-wpel-link="internal">Personal Data Transfers Post-Privacy Shield</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">The European Court of Justice’s recent move to strike down the US-EU privacy shield agreement has upended the bilateral personal data transfer framework and pulled the rug out from under numerous American businesses who work with European customers’ personal data. But although the agreement was invalidated, there remain several steps to take and options to pursue that can enable US businesses to help maintain their operations.</p>
<p>The 2016 bilateral US-EU Privacy Shield agreement allowed US companies to agree that they would adhere to the privacy and personal data rules and standards of the EU, thereby providing an equivalent level of protection to EU citizens and facilitating personal data transfers between the two. However, the European Court of Justice has now rejected that principle. In its decision(1), the court explained that the Privacy Shield agreement failed to provide adequate protection because it could not stop US intelligence services from accessing the personal data even for companies who were Privacy Shield compliant. Furthermore, it was quite difficult for an EU citizen to file a complaint about a potential violation.</p>
<p>Although the decision did strike down the legal validity of the Privacy Shield agreement, one key observation is that the decision notably did not eliminate privacy standard contractual clauses (SCCs). These are cookie-cutter contractual clauses drafted and pre-approved by European regulators for use in privacy-related service agreements with customers. The court allowed SCCs to remain a valid tool in principle because courts have the authority to potentially strike them down and invalidate them on a case-by-case basis if they determine that they are problematic. With the elimination of the Privacy Shield, SCCs will likely be the primary legal tool that US companies rely upon to achieve compliance with EU GDPR and the transfer of EU citizens’ data overseas, and this is an option many companies will want to pursue.</p>
<div>
<p>Binding corporate rules (BCRs) are another arrow in the quiver that remains legally viable. While SCCs provide coverage for transfers to third parties, BCRs provide a legal framework for organizations to transfer data internally among affiliate organizations. BCRs are tailored to the operations of each company, who must apply to have each BCR approved by a local supervisory DPA. Although the process is usually expensive and can take a considerable time to achieve approval, the advantage to BCRs is that once in place they can cover a wide variety of transfer activities, whereas separate SCCs are needed for each individual data transfer. New BCR applications will likely need to address in detail how US affiliates will maintain privacy in the context of government surveillance activities. Companies that have the necessary time and resources may find pursuing a BCR to be a comprehensive alternative for achieving data transfer adequacy.</p>
<p>Furthermore, even though the legal effect of the privacy shield agreement in the EU has passed, the Privacy Shield hasn’t completely bitten the dust. The Privacy Shield List of self-certifying companies remains intact, and the companies who have self-certified compliance with its standards should not presume to immediately halt compliance with it. Even without the force of law, following the Privacy Shield standards on a voluntary basis does demonstrate a level of commitment to privacy that would in any case be appreciated by customers and business partners. In addition, businesses who have made commitments that they will abide by Privacy Shield may remain legally bound to continue implementing the standards despite the EU invalidation. US companies are probably well-served by continuing to adhere to the Privacy Shield standards as a matter of good business practice.</p>
<p>Finally, companies can take comfort in the fact that any personal data transfers that are necessary to fulfill a contract with the customer continue to be permissible. If an essential component of the product or service you’re offering to an EU person requires the sending or receiving of their personal data, this remains allowed post-Privacy Shield. The court’s decision does not destroy the ability of companies to continue providing core services and fulfilling their obligations to their EU customers just because the Privacy Shield is no longer valid, so companies probably will not need to worry that their core lines of business could be eliminated by this ruling.</p>
<p>While each of these facts does serve to blunt the impact of the court’s decision, US companies are still likely to face ongoing challenges when dealing with EU citizens’ personal data for the foreseeable future. This situation will persist unless and until an updated agreement can be reached between the EU and US which fully accounts for and remediates the deficiencies that the court identified within the old Privacy Shield agreement.</p>
<p>(1) <a href="https://curia.europa.eu/jcms/upload/docs/application/pdf/2020-07/cp200091en.pdf" data-wpel-link="external" rel="external noopener noreferrer">https://curia.europa.eu/jcms/upload/docs/application/pdf/2020-07/cp200091en.pdf</a></p>
<div><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
</div></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_3 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2023/05/Frank-01-96x96-1.png" alt="Author: Frank Fazzio, IGP, CRM" class="wp-image-1966" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Frank Fazzio, IGP, CRM</h4>
					<p class="et_pb_member_position">Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fpersonal-data-transfers-post-privacy-shield%2F&amp;linkname=Personal%20Data%20Transfers%20Post-Privacy%20Shield" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fpersonal-data-transfers-post-privacy-shield%2F&amp;linkname=Personal%20Data%20Transfers%20Post-Privacy%20Shield" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fpersonal-data-transfers-post-privacy-shield%2F&amp;linkname=Personal%20Data%20Transfers%20Post-Privacy%20Shield" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fpersonal-data-transfers-post-privacy-shield%2F&#038;title=Personal%20Data%20Transfers%20Post-Privacy%20Shield" data-a2a-url="https://zasio.com/personal-data-transfers-post-privacy-shield/" data-a2a-title="Personal Data Transfers Post-Privacy Shield" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/personal-data-transfers-post-privacy-shield/" data-wpel-link="internal">Personal Data Transfers Post-Privacy Shield</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/personal-data-transfers-post-privacy-shield/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Internet Service Providers Launch Litigation Against Maine’s New Opt-In Privacy Law</title>
		<link>https://zasio.com/internet-service-providers-launch-litigation-against-maines-new-opt-in-privacy-law/</link>
					<comments>https://zasio.com/internet-service-providers-launch-litigation-against-maines-new-opt-in-privacy-law/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Tue, 25 Feb 2020 19:18:09 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Frank Fazzio]]></category>
		<category><![CDATA[Act to Protect the Privacy of Online Customer Information]]></category>
		<category><![CDATA[Frank Fazzio]]></category>
		<category><![CDATA[internet service providers]]></category>
		<category><![CDATA[ISP’s]]></category>
		<category><![CDATA[LD 946]]></category>
		<category><![CDATA[Maine]]></category>
		<category><![CDATA[privacy]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=734</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/internet-service-providers-launch-litigation-against-maines-new-opt-in-privacy-law/" data-wpel-link="internal">Internet Service Providers Launch Litigation Against Maine’s New Opt-In Privacy Law</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Several internet service provider (ISP) industry groups have joined together in bringing suit against the state of Maine in response to its new privacy law, LD 946 “An Act To Protect the Privacy of Online Customer Information,” asserting that the new rules run afoul of their free speech rights and constitute discrimination against their industry. According to Maine’s Governor Janet Mills, the law, which is set to go into effect on the 1<sup>st</sup> of July, requires ISP’s to obtain customers’ opt-in consent before using, disclosing, selling or permitting access to customer personal information, and prohibits ISP’s from refusing to serve a customer, charging a customer a penalty, or offering a customer a discount if the customer does or does not consent to the use, disclosure, sale or access of their personal information.<a href="https://www.zasio.com/internet-service-providers-launch-litigation-against-maines-new-opt-in-privacy-law/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a></p>
<p>Lawyers for the ISP’s contend that the new law violates their constitutional right to free expression. According to the lawsuit, the law impermissibly prevents “ISPs from advertising or marketing non-communications-related services to their customers; and prohibits ISPs from offering price discounts, rewards in loyalty programs, or other cost-saving benefits in exchange for a customer’s consent to use their personal information,” which violates the first amendment because it “excessively burdens ISPs’ beneficial, pro-consumer speech about a wide variety of subjects, with no offsetting privacy-protection benefits.” <a href="https://www.zasio.com/internet-service-providers-launch-litigation-against-maines-new-opt-in-privacy-law/#_ftn2" name="_ftnref2" data-wpel-link="internal">[2]</a> The lawsuit also asserts that much of the data being restricted is neither sensitive in nature nor personally identifying.</p>
<p>The ISP’s further argue that the law is discriminatory because it targets only their industry subset, while “ignoring” other companies who are using or selling customer personal information in connection with services provided over the internet or through brick-and-mortar retail outlets. Absent any evidence or legislative findings that justify targeting ISP’s, they argue, Maine’s privacy law constitutes discrimination against similarly situated speakers forbidden by the first amendment. They also claim that the law is unconstitutionally vague, and is in any case preempted by federal legislation which repealed and prohibited ISP-specific federal privacy rules, and furthermore thwarts the ability of ISP’s to comply with several mandatory federal reporting requirements.</p>
<p>These arguments potentially raise colorable challenges to the efforts of state lawmakers to regulate privacy on a state-by-state basis. The United States Constitution’s guarantee of free speech offers a unique avenue for American companies to push back against the slew of new privacy laws being enacted by California (California Consumer Privacy Act – CCPA) and other U.S. states. In addition, the fact that Congress has declined to enact comprehensive federal privacy legislation – coupled with the Federal Communication Commission’s current posture that disclosure, competition, and federal oversight is the best way to regulate and promote internet consumer privacy – may weigh on the enforceability of the growing patchwork of state privacy laws in light of the supremacy of federal law.  Will federal courts interpret these facts as limitations on the authority of each State to enact its own privacy laws?</p>
<p>State legislatures will likely be paying close attention to the outcome of this case. If the industry groups’ argument against ISP-specific legislation gains traction, that may support a trend towards more broadly-written privacy laws that aim to generally cover all personal data use rather than focusing on a specific industry sector. But in a larger sense, the industry groups’ assertion that federal laws and regulations substantially preempt state efforts to regulate online consumer privacy represents an important skirmish in the ongoing struggle over efforts to fill the void left by Congress’ decision to refrain from passing a comprehensive federal privacy law. Unless and until such a federal law is passed, federal court decisions are likely to set the tone for both the pervasiveness and scope of potential privacy laws produced by state legislatures across the country. If legal challenges to state laws are successful, the result could be a simplified and streamlined legal landscape instead of a menagerie of sector-specific privacy laws among the 50 states, which would certainly be far simpler for RIM professionals from a compliance perspective. If lawsuits like this one are not successful, we can expect to see a lot more privacy legislation and complexity on the horizon.</p>
<p><a href="https://www.zasio.com/internet-service-providers-launch-litigation-against-maines-new-opt-in-privacy-law/#_ftnref1" name="_ftn1" data-wpel-link="internal">[1]</a> <a href="https://www.maine.gov/governor/mills/news/governor-mills-signs-internet-privacy-legislation-2019-06-06" data-wpel-link="external" rel="external noopener noreferrer">https://www.maine.gov/governor/mills/news/governor-mills-signs-internet-privacy-legislation-2019-06-06</a></p>
<p><a href="https://www.zasio.com/internet-service-providers-launch-litigation-against-maines-new-opt-in-privacy-law/#_ftnref2" name="_ftn2" data-wpel-link="internal">[2]</a> <a href="https://acaconnects.org/u-s-district-court-for-the-district-of-maine-complaint-for-declaratory-judgment-and-injunctive-relief-w-ctia-ncta-and-ustelecom-re-maines-l-d-946/" data-wpel-link="external" rel="external noopener noreferrer">https://acaconnects.org/u-s-district-court-for-the-district-of-maine-complaint-for-declaratory-judgment-and-injunctive-relief-w-ctia-ncta-and-ustelecom-re-maines-l-d-946/</a></p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_4 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2023/05/Frank-01-96x96-1.png" alt="Author: Frank Fazzio, IGP, CRM" class="wp-image-1966" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Frank Fazzio, IGP, CRM</h4>
					<p class="et_pb_member_position">Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Finternet-service-providers-launch-litigation-against-maines-new-opt-in-privacy-law%2F&amp;linkname=Internet%20Service%20Providers%20Launch%20Litigation%20Against%20Maine%E2%80%99s%20New%20Opt-In%20Privacy%20Law" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Finternet-service-providers-launch-litigation-against-maines-new-opt-in-privacy-law%2F&amp;linkname=Internet%20Service%20Providers%20Launch%20Litigation%20Against%20Maine%E2%80%99s%20New%20Opt-In%20Privacy%20Law" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Finternet-service-providers-launch-litigation-against-maines-new-opt-in-privacy-law%2F&amp;linkname=Internet%20Service%20Providers%20Launch%20Litigation%20Against%20Maine%E2%80%99s%20New%20Opt-In%20Privacy%20Law" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Finternet-service-providers-launch-litigation-against-maines-new-opt-in-privacy-law%2F&#038;title=Internet%20Service%20Providers%20Launch%20Litigation%20Against%20Maine%E2%80%99s%20New%20Opt-In%20Privacy%20Law" data-a2a-url="https://zasio.com/internet-service-providers-launch-litigation-against-maines-new-opt-in-privacy-law/" data-a2a-title="Internet Service Providers Launch Litigation Against Maine’s New Opt-In Privacy Law" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/internet-service-providers-launch-litigation-against-maines-new-opt-in-privacy-law/" data-wpel-link="internal">Internet Service Providers Launch Litigation Against Maine’s New Opt-In Privacy Law</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/internet-service-providers-launch-litigation-against-maines-new-opt-in-privacy-law/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Quantum Supremacy: Rethink Encryption in Records and Information Management</title>
		<link>https://zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/</link>
					<comments>https://zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Mon, 28 Oct 2019 20:06:46 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Frank Fazzio]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Frank Fazzio]]></category>
		<category><![CDATA[information governance]]></category>
		<category><![CDATA[Quantum computer]]></category>
		<category><![CDATA[quantum computing]]></category>
		<category><![CDATA[quantum entanglement]]></category>
		<category><![CDATA[qubits]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=759</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/" data-wpel-link="internal">Quantum Supremacy: Rethink Encryption in Records and Information Management</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_10">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_10  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Encryption is an essential element in the toolbox of any security professional or records manager. In the event of a data breach, encryption acts as a failsafe to make stolen data unreadable to hackers and prevent them from putting it to nefarious uses. Encryption also plays a key role in our ordinary daily lives. When you log in to a website or pay with your credit card, you are relying on encryption to keep your credentials out of the hands of thieves. The encrypted contents of smartphones keep our private conversations and photographs safe from prying eyes. Even law enforcement agencies like the FBI and CIA are unable to read the contents of certain encrypted messages and devices. Blockchain technology built on encryption has captured the attention of investors and futurists during the last few years. Encryption has now become so effective, reliable, and ingrained in our society that it has even been enshrined in legislation — numerous laws, including the recently passed CCPA, require the encryption of personal information to protect against unauthorized disclosure. Indeed, encryption algorithms act as the mortar that binds together much of the elaborate architecture of our digital lifestyle. Unfortunately, scientific advances are beginning to reveal that this architecture might be built upon a foundation made of sand. New innovations in quantum computing have upended long-held assumptions about the level of safety and security that encryption provides, and may soon necessitate a shift in the way society relies upon it.</p>
<p>The basic premise behind encryption is that it offers effectively unbreakable security. There is simply no practical way to overcome strong encryption without the existence of a “backdoor” that allows one to obtain the decryption keys. The secret sauce behind unbreakable encryption is a numerical puzzle so incomprehensibly difficult that even the fastest computer would have no hope of solving it, not even if given (quite literally) a million billion years to run. However, that presumption of impossibility has now been shattered by the advent of quantum computing.</p>
<p>Quantum computers are fundamentally different from classical computers. Traditional computer transistors can take a value of either 1 or 0, on or off, to store one “bit” of information. Quantum computers instead use “qubits” that can assume a value of 1, 0, or any value in between. This allows qubits to counterintuitively be partly on and partly off at the same moment, a property called “superposition.” Superposition dramatically expands the number of possible different configurations that an arrangement of qubits can take, thereby amplifying their computational potential by a dizzying amount.</p>
<p>Qubits also make use of a phenomenon called “quantum entanglement.” Einstein called this “spooky action at a distance,” but in the ordinary sense this just means that entangled qubits are able to affect one another without necessarily being in physical contact. An operation or measurement performed on one entangled qubit will have a predictable impact on all other entangled qubits. A quantum computer exploits this relationship by entangling multiple qubits so that a collection of entangled qubits together stores all of the possible combinations of states that the computer system can assume.</p>
<p>As a consequence of these properties, quantum computers can dramatically outperform classical computers. While a classical computer’s problem-solving power scales linearly with the volume of computing power available to it, quantum computers operate on a geometric scale. For instance, a doubly difficult problem will take a traditional computer twice as long to solve, but it will only take a quantum computer √2 as long, or 41% longer. This may not sound like much of a difference, but the time savings add up when the problems get much harder. All things being equal, when dealing with a problem a million times harder, it will take a traditional computer a million times longer to solve it…but for a quantum computer, only a thousand times longer.</p>
<p>To illustrate the potential difference this could make, a 2048-bit SSL certificate would take an average desktop computer about 6.4 quadrillion years to crack.<a href="https://www.zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a> But Martin Ekerå at the KTH Royal Institute of Technology in Stockholm, Sweden and Craig Gidney of Google have shown that a quantum computer with 20 million qubits could theoretically solve it in only about 8 hours.<a href="https://www.zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/#_ftn2" name="_ftnref2" data-wpel-link="internal">[2]</a></p>
<p>Quantum computing has been the stuff of science fiction for decades, but recent breakthroughs are now dramatically accelerating the timeline for quantum computing to go from concept to reality. Not long ago, experts assumed it would be decades before the first quantum computers would be built, but a 72-qubit quantum computer is now already operational.<a href="https://www.zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/#_ftn3" name="_ftnref3" data-wpel-link="internal">[3]</a> Even more astonishingly, a paper last month stunned the world by revealing that Google has successfully used a 54-qubit quantum computer called Sycamore to complete a computation in just a few minutes that would have required over 10,000 years for the world’s fastest supercomputer to complete – an achievement that has been widely referred to “quantum supremacy.”<a href="https://www.zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/#_ftn4" name="_ftnref4" data-wpel-link="internal">[4]</a> Encryption enthusiasts predicted with glee that a quantum computer like Sycamore could potentially pack enough computing power to mine all 3 million remaining Bitcoins in about 2 seconds (bitcoins are designed to be mined at a rate of 12.5 globally every 10 minutes).<a href="https://www.zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/#_ftn5" name="_ftnref5" data-wpel-link="internal">[5]</a>  But IBM, another leading name in quantum computing research, has questioned the accuracy of Google’s claim, estimating that its Summit classical supercomputer could actually run the calculation in as little as 2.5 days.<a href="https://www.zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/#_ftn6" name="_ftnref6" data-wpel-link="internal">[6]</a></p>
<p>Even if Google’s achievement falls short of true quantum supremacy, that milestone is in any case still far closer than previously thought. While 72 bits may seem like a far cry from 20 million, consider the fact that computers in the 1970s contained only thousands of transistors, while today’s latest processors can pack billions onto a chip the size of a fingernail.<a href="https://www.zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/#_ftn7" name="_ftnref7" data-wpel-link="internal">[7]</a></p>
<p>There do exist post-quantum codes to encrypt information so that even a quantum computer will not be able to crack it. However, these encryption algorithms are rather unwieldy – for example, one post-quantum encryption algorithm requires the use of a public key with a file size weighing in at over a terabyte.<a href="https://www.zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/#_ftn8" name="_ftnref8" data-wpel-link="internal">[8]</a> One can imagine the huge expenses and logistical challenges associated with rolling out this type of encryption on a wider scale. It might only make sense to use post-quantum encryption algorithms for critical information that needs to be kept secure for very long periods of time; longer than the 20-25 years it may take for quantum computing technology to advance.</p>
<p>Quantum computers are still in their infancy, but the technology is developing at a rapid and accelerating pace. Records managers and IT admins would do well to start thinking about employing post-quantum encryption for the most vital records and information that require long-term protection, lest they be caught unprepared once quantum computing technology eventually takes off. The consequences are trivial if an encrypted email about a new marketing initiative or an instant message about grabbing tacos for lunch might be decrypted 20 years from now. But for highly sensitive information – e.g., candid or embarrassing high-level conversations of top executives or government officials, classified top-secret documents, the formula for Coke – one may care very much about that information being potentially exposed a few years down the road.</p>
<p>While most companies do not possess information that rises to this level of sensitivity, those that do need to be clear-eyed about the potential future implications of quantum technology and take proportional measures to prepare for its arrival. A “wait-and-see” approach is often a wise choice in the records and information management space when dealing with potential legal, regulatory, or technological developments. But when hardening critical systems against quantum computing attacks, time may be a luxury that one can ill afford, and the failure to make necessary preparations well in advance of quantum computing technology developments could potentially have disastrous consequences for the security of vital information.</p>
<p>&nbsp;</p>
<p><a href="https://www.zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/#_ftnref1" name="_ftn1" data-wpel-link="internal">[1]</a> https://www.digicert.com/TimeTravel/math.htm</p>
<p><a href="https://www.zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/#_ftnref2" name="_ftn2" data-wpel-link="internal">[2]</a> https://www.technologyreview.com/s/613596/how-a-quantum-computer-could-break-2048-bit-rsa-encryption-in-8-hours/</p>
<p><a href="https://www.zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/#_ftnref3" name="_ftn3" data-wpel-link="internal">[3]</a> https://www.sciencenews.org/article/google-moves-toward-quantum-supremacy-72-qubit-computer</p>
<p><a href="https://www.zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/#_ftnref4" name="_ftn4" data-wpel-link="internal">[4]</a> https://www.newscientist.com/article/2217347-google-claims-it-has-finally-reached-quantum-supremacy/</p>
<p><a href="https://www.zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/#_ftnref5" name="_ftn5" data-wpel-link="internal">[5]</a> https://bitcoinist.com/3-million-bitcoin-in-2-seconds-google-quantum-computer/</p>
<p><a href="https://www.zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/#_ftnref6" name="_ftn6" data-wpel-link="internal">[6]</a> https://hexus.net/tech/news/cpu/136028-ibm-disputes-googles-quantum-supremacy-claim/</p>
<p><a href="https://www.zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/#_ftnref7" name="_ftn7" data-wpel-link="internal">[7]</a> https://www.sciencealert.com/new-computer-chips-can-fit-30-million-transistors-on-your-fingertip</p>
<p><a href="https://www.zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/#_ftnref8" name="_ftn8" data-wpel-link="internal">[8]</a> https://eprint.iacr.org/2017/351.pdf</p>
<p>&nbsp;</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_11">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_11  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_5 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2023/05/Frank-01-96x96-1.png" alt="Author: Frank Fazzio, IGP, CRM" class="wp-image-1966" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Frank Fazzio, IGP, CRM</h4>
					<p class="et_pb_member_position">Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fquantum-supremacy-rethink-encryption-in-records-and-information-management%2F&amp;linkname=Quantum%20Supremacy%3A%20Rethink%20Encryption%20in%20Records%20and%20Information%20Management" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fquantum-supremacy-rethink-encryption-in-records-and-information-management%2F&amp;linkname=Quantum%20Supremacy%3A%20Rethink%20Encryption%20in%20Records%20and%20Information%20Management" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fquantum-supremacy-rethink-encryption-in-records-and-information-management%2F&amp;linkname=Quantum%20Supremacy%3A%20Rethink%20Encryption%20in%20Records%20and%20Information%20Management" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fquantum-supremacy-rethink-encryption-in-records-and-information-management%2F&#038;title=Quantum%20Supremacy%3A%20Rethink%20Encryption%20in%20Records%20and%20Information%20Management" data-a2a-url="https://zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/" data-a2a-title="Quantum Supremacy: Rethink Encryption in Records and Information Management" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/" data-wpel-link="internal">Quantum Supremacy: Rethink Encryption in Records and Information Management</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/quantum-supremacy-rethink-encryption-in-records-and-information-management/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Proposed New York Privacy Act Breaks New Ground on Personal Data</title>
		<link>https://zasio.com/proposed-ny-privacy-act-breaks-new-ground-on-personal-data/</link>
					<comments>https://zasio.com/proposed-ny-privacy-act-breaks-new-ground-on-personal-data/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Mon, 08 Jul 2019 20:27:34 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Frank Fazzio]]></category>
		<category><![CDATA[CCPA]]></category>
		<category><![CDATA[data fiduciary]]></category>
		<category><![CDATA[Frank Fazzio]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[New York Privacy Act]]></category>
		<category><![CDATA[personal data privacy]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[privacy law]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=780</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/proposed-ny-privacy-act-breaks-new-ground-on-personal-data/" data-wpel-link="internal">Proposed New York Privacy Act Breaks New Ground on Personal Data</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_12">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_12  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Now that the one-year anniversary of the GDPR implementation date has come and gone, many in the business world are collectively exhaling after a long and arduous period of privacy compliance efforts. But the respite is short-lived: preparations are already underway to handle the new California Consumer Privacy Act (CCPA), which will go into effect on January 1, 2020 (pending any last-minute amendments during the interim). The CCPA has a one-year lookback period, meaning that CCPA-compliant recordkeeping should already be well underway. However, another challenging new privacy law is already potentially looming on the horizon. New York lawmakers recently introduced a groundbreaking new piece of legislation that in some aspects might be significantly tougher than either the GDPR or the CCPA. If passed as written, the <a href="https://www.nysenate.gov/legislation/bills/2019/s5642" data-wpel-link="external" rel="external noopener noreferrer">New York Privacy Act</a> may represent a seismic shift in how companies use and manage their customers’ personal data. While similar to other privacy laws in many respects, the draft law may have dramatically sharper teeth due to two important provisions.</p>
<p>In the first, it imposes a completely novel new duty on anyone processing consumer personal data, which the law calls a “data fiduciary.” A data fiduciary must exercise the “duty of care, loyalty and confidentiality expected of a fiduciary with respect to securing the personal data of a consumer against a privacy risk; and shall act in the best interests of the consumer, without regard to the interests of the entity, controller or data broker, in a manner expected by a reasonable consumer under the circumstances.” Any third party with whom the fiduciary shares or sells data must also agree to abide by that same standard. Furthermore, to avoid any doubt, the law clarifies that the data fiduciary duty “shall supersede any duty owed to owners or shareholders of a legal entity or affiliate thereof, controller or data broker, to whom this article applies.”</p>
<p>Acting in a way that protects the interests of consumers is a worthy goal, but the immediate issue with this provision for many businesses is that processing personal data for use in marketing, including the selling of targeted advertisements, generally confers a financial benefit on the company at the expense of consumers’ privacy. And although the businesses have a duty to their shareholders to manage the business in a profitable way and extract value from its assets, that duty now takes a backseat to their obligations to consumers. The practice is so lucrative that it has become an indispensable bedrock revenue stream for some of the largest tech giants of Silicon Valley, without which many of those companies may not be profitable at all.</p>
<p>In the second, the law departs from the CCPA by granting an expansive private right of action to consumers who have been harmed by non-compliance with the law. The CCPA mostly leaves enforcement to the California Attorney General, allowing private persons to recover damages only in the limited event of a data breach that exposes their unencrypted personal information. But New York’s draft law would instead give every individual the right to sue to enjoin any activity that violates the law and/or recover damages. The private right of action would potentially force companies to defend against a barrage of lawsuits, particularly class-action lawsuits, from a variety of different claimants. A similar provision was contemplated for the CCPA but was ultimately excluded from the final version after an intense round of lobbying from business interests.</p>
<p>Taken together, those two features could constitute a one-two punch that deals a heavy blow to company bottom lines by exposing them to open-ended liability while simultaneously hampering many of their most reliable and profitable revenue streams.</p>
<p>In addition, the law also doesn’t have any type of revenue hurdle for bringing businesses into its enforcement purview. The CCPA sets the threshold for compliance at one of the following: $25 million in revenue, service of 50k or more California consumers or devices, or deriving at least 50% of revenue from selling California consumers’ personal information. Conversely, the New York Privacy Act would be applicable to all entities and individuals, large and small—which could potentially make compliance for small businesses very tricky or expensive.</p>
<p>Since this bill is still only in draft form in committee, a lot could change before it is put for a vote or enacted into law. And with New York and other states joining California in a push to regulate personal data privacy, the incentive to replace a myriad of State-level laws with one unified Federal privacy act may grow even stronger in the near future. As they wait for the legislative process to unfold, in the meantime business managers and privacy professionals should continue to build out their capacities to monitor and control their processing of personal data so that they will have the flexibility and agility to be able to proactively manage requirements like the New York Privacy Act and other future regulatory developments.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_13">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_13  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_6 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2023/05/Frank-01-96x96-1.png" alt="Author: Frank Fazzio, IGP, CRM" class="wp-image-1966" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Frank Fazzio, IGP, CRM</h4>
					<p class="et_pb_member_position">Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fproposed-ny-privacy-act-breaks-new-ground-on-personal-data%2F&amp;linkname=Proposed%20New%20York%20Privacy%20Act%20Breaks%20New%20Ground%20on%20Personal%20Data" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fproposed-ny-privacy-act-breaks-new-ground-on-personal-data%2F&amp;linkname=Proposed%20New%20York%20Privacy%20Act%20Breaks%20New%20Ground%20on%20Personal%20Data" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fproposed-ny-privacy-act-breaks-new-ground-on-personal-data%2F&amp;linkname=Proposed%20New%20York%20Privacy%20Act%20Breaks%20New%20Ground%20on%20Personal%20Data" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fproposed-ny-privacy-act-breaks-new-ground-on-personal-data%2F&#038;title=Proposed%20New%20York%20Privacy%20Act%20Breaks%20New%20Ground%20on%20Personal%20Data" data-a2a-url="https://zasio.com/proposed-ny-privacy-act-breaks-new-ground-on-personal-data/" data-a2a-title="Proposed New York Privacy Act Breaks New Ground on Personal Data" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/proposed-ny-privacy-act-breaks-new-ground-on-personal-data/" data-wpel-link="internal">Proposed New York Privacy Act Breaks New Ground on Personal Data</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/proposed-ny-privacy-act-breaks-new-ground-on-personal-data/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CNIL Fines Google, Company Vows Appeal: Clarity, or Confusion?</title>
		<link>https://zasio.com/cnil-fines-google-company-vows-appeal/</link>
					<comments>https://zasio.com/cnil-fines-google-company-vows-appeal/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Fri, 01 Feb 2019 20:12:21 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Frank Fazzio]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Frank Fazzio]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[General Data Protection Regulation]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[privacy]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=836</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/cnil-fines-google-company-vows-appeal/" data-wpel-link="internal">CNIL Fines Google, Company Vows Appeal: Clarity, or Confusion?</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_14">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_14  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Reading Time: 4 minutes, 37 seconds</p>
<p>The €50 million fine levied last week by the French National Commission on Informatics and Liberty (CNIL) against Google for violations of the GDPR has struck the tech industry with a resounding thunderclap, sending shockwaves that are being felt in boardrooms across the globe.  As the first significant penalty imposed against a major multinational technology company under the EU’s new GDPR regime, the hefty fine is widely viewed as a shot across the bow in the coming struggle between privacy regulators and big data aggregators about the scope of conduct that will be permitted under the new rules.  While surely intended as an instructive example to set the tone of regulators’ expectations, the contours of the CNIL decision and Google’s swift pledge to appeal the ruling likely means this event will generate as many new questions as it answers.</p>
<p>Long before the GDPR came into force last May, tech companies have been pouring tremendous resources into bringing their operations into compliance with the new requirements, and those efforts continue today. But the degree to which those requirements would be enforced and the severity of the actual penalties that would be imposed have remained hypothetical—until now.</p>
<p>In announcing the penalty, the CNIL identified two areas where Google allegedly violated GDPR requirements. In the first, the CNIL cited a “violation of the obligations of transparency and information” because the information provided by Google is not easily accessible.  Google’s data processing purposes, storage periods, and the categories of personal data can only be reached after clicking several buttons, totaling as many as five or six actions before reaching the relevant information. Furthermore, the operations are “particularly massive and intrusive” in light of the constellation of different services offered and the volume of data processed and combined.</p>
<p>In the second, the CNIL identified a “violation of the obligation to have a legal basis for ads personalization processing.” While Google does obtain users’ consent to process personal data for targeted advertisement, the CNIL alleges that the consent is “not validly obtained” because the user is not sufficiently informed and the consent is neither specific nor unambiguous. By spreading the necessary information across several documents, users struggle to understand the scope of the information processing.  While options for targeted ads can be customized through a series of check-boxes, the default state is for those boxes to be ticked “yes,” while the GDPR conversely requires an affirmative act—for instance, ticking a box that has by default been set to “no.”</p>
<p>Although this action is rightly interpreted as a warning intended to provide clarity and induce companies to take heed and make changes, it also raises a number of new questions.  And some of the largest tech industry players may find that there is no easy way to revise their products and services framework and literature to bring their operations in line with regulators’ expectations.</p>
<p>Google is by no means a small company and, while €50 million will not have a material impact on the financial condition of a company the size of Google, fines of this magnitude could threaten the survival of many smaller companies who handle personal data.</p>
<p>In addition to the threat of much higher fines, the ruling also threatens the company’s bottom line by potentially disrupting the tremendous targeted ad revenues that make up a large portion of that $110 billion in revenue.  For instance, even by just making one single alteration referenced in the CNIL’s decision—changing the default personal data sharing option to “no”—the number of users who opt to make their personal data available for processing could suffer a precipitous fall. This trend might be exacerbated once newly revised privacy disclosures lead to customers having a more complete understanding of all that is being done with their data. Armed with this knowledge, customers are more likely to opt “no” in far greater numbers.</p>
<p>Furthermore, the ruling raises important questions about what general conclusions the tech industry can draw about adequate privacy disclosures based on the deficiencies identified by the CNIL.  Are boxes ticked by default to “yes” to be prohibited in all cases, or just in this particular case? If five or six actions to access relevant privacy information is opaque, will two or three be considered transparent, or must it be one… or zero?</p>
<p>One might also wonder: how it is possible for a company to offer dozens of interconnected services that share and co-mingle customers’ personal data across platforms, while at the same time making it <em>easy</em> to understand all of the purposes, uses, and retention periods for that data? Is it even possible, or is that a contradiction in terms? This conundrum could present a Gordian knot that Google and others in the tech industry may find impossible to untangle without cutting some of their current product and service offerings. The answers to these questions and many others will come into greater focus as the appeal plays out and future enforcement actions come down the pipeline. But for now, one thing is crystal clear: this ruling presents an ill omen for business models that rely on customers to swiftly click “accept” and share their personal data.</p>
<p>While the drumbeat of GDPR compliance may have become all too familiar to privacy practitioners during the past few years, the CNIL’s decision on Google underlines the reality that we are likely only just witnessing the opening act of an epic drama whose scenes will take center stage for a global audience of politicians, regulators, and tech titans for many years to come.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_15">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_15  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_7 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2023/05/Frank-01-96x96-1.png" alt="Author: Frank Fazzio, IGP, CRM" class="wp-image-1966" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Frank Fazzio, IGP, CRM</h4>
					<p class="et_pb_member_position">Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fcnil-fines-google-company-vows-appeal%2F&amp;linkname=CNIL%20Fines%20Google%2C%20Company%20Vows%20Appeal%3A%20Clarity%2C%20or%20Confusion%3F" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fcnil-fines-google-company-vows-appeal%2F&amp;linkname=CNIL%20Fines%20Google%2C%20Company%20Vows%20Appeal%3A%20Clarity%2C%20or%20Confusion%3F" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fcnil-fines-google-company-vows-appeal%2F&amp;linkname=CNIL%20Fines%20Google%2C%20Company%20Vows%20Appeal%3A%20Clarity%2C%20or%20Confusion%3F" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fcnil-fines-google-company-vows-appeal%2F&#038;title=CNIL%20Fines%20Google%2C%20Company%20Vows%20Appeal%3A%20Clarity%2C%20or%20Confusion%3F" data-a2a-url="https://zasio.com/cnil-fines-google-company-vows-appeal/" data-a2a-title="CNIL Fines Google, Company Vows Appeal: Clarity, or Confusion?" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/cnil-fines-google-company-vows-appeal/" data-wpel-link="internal">CNIL Fines Google, Company Vows Appeal: Clarity, or Confusion?</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/cnil-fines-google-company-vows-appeal/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
