Data Privacy Day Celebrates a New Era in Privacy

January 28, 2019 Jessica Sirkin

 

Today is 10th annual international Data Privacy Day. Data Privacy Day commemorates the signing of the first legally binding international treaty on data protection on January 28, 1981 – Convention 108. The holiday was originally celebrated in Europe – where the originally treaty was signed – but, in 2009, the U.S. and Canada joined the celebration. In the United States, Data Privacy Day is sponsored by the National Security Alliance (NCSA).

This year, the theme of Data Privacy Day is “A New Era in Privacy.” As the technology landscape changes, how do you maintain your privacy while forging ahead as a thought leader? The Data Privacy Day event features lectures and panel discussions from experts in business, academia, research and advocacy. They will cover topics like compliance and thought leadership, privacy and breakthrough technology, privacy in the cloud and the GDPR and California Consumer Privacy Act.

While GDPR has made individuals more privacy-aware, there are many cases where poor security habits persist. A recent CyberArk survey showed that nearly half of office workers have had access to sensitive documents, including HR data. Additionally, the survey showed that nearly one in five (19 percent) office workers report that their IT security team is experimenting with biometric security techniques, including fingerprint and retinal scans and embedded microchips – a further step in addressing emerging privacy concerns in the workplace. With its “A New Era in Privacy” theme, Data Privacy Day addresses innovations in data privacy like these.

LinkedIn is hosting Data Privacy Day this year at its San Francisco headquarters from 1:30 to 5:30 PST. For anyone who can’t make the trip, the event is available on livestream.

 

Previous Article
Three Things to Consider When Picking a Privileged Access Management Solution for your Cybersecurity Strategy
Three Things to Consider When Picking a Privileged Access Management Solution for your Cybersecurity Strategy

Protecting privileged access is paramount in any cybersecurity strategy. Learn how to select the right solu...

Next Article
Real Substance on Privileged Access in DevOps and Cloud
Real Substance on Privileged Access in DevOps and Cloud

If you share a generation with me (which is, uh, old), then you likely will remember those great Wendy’s TV...