Data Access and Deletion in the Large Scale Structured and Unstructured Datasets | Privacy Engineering & Technology Education Discussion (PETed) Recording

Privacy technologists struggle to efficiently handle large-scale requests for data access and deletion due to challenges in mapping data across systems, avoiding production disruptions, and redacting unrelated information from unstructured data. This requires scalable solutions to ensure regulatory compliance and protect data rights without compromising system performance.

From Permission Usage to Compliance Analysis | Privacy Engineering & Technology Education Discussion (PETed) Recording

We have been analyzing Android apps for regulatory requirements for eight years. We have analyzed Android apps for COPPA, CCPA, and Health Compliance (HIPAA, HBNR, and FTC Act). In this talk, Primal Wijesekera presents the lessons learned after analyzing thousands of apps, the technical challenges we face while analyzing Android apps, patterns of non-compliance issues we uncovered, and the likely root causes of non-compliance.

Deploying Decentralized Privacy-Preserving Contact Tracing | Privacy Engineering & Technology Education Discussion (PETed) Recording

Digital contact tracing systems promised to help combat the COVID-19 pandemic; but in doing so introduce privacy risks. Privacy-friendly contact tracing systems enable notification of exposed people without privacy harms. In this webinar Wouter Lueks will talk about his experience designing a large-scale privacy-friendly digital contact tracing system that later led to the system adopted by Google and Apple, and experiences deploying such a privacy-friendly system in the wild.

Assurance Cases | Privacy Engineering & Technology Education Discussion (PETed) Recording

Assurance cases are gaining traction as a means of certification in Aerospace and other safety and security critical industries. However, these assurance cases can become overwhelming and complicated, even for moderately complex systems. Therefore, there is a compelling requirement to develop new automation that can aid in creating and assessing assurance cases.

Vector Databases: AI Uses, Privacy Risks, and Mitigations | Privacy Engineering & Technology Education Discussion (PETed) Recording

Developers are rushing to adopt new AI tools and techniques, and private data for AI systems is shifting out of models and into vector databases. These new databases are immature from a security and privacy perspective, and the attacks against them are numerous and growing by the day. Understanding, controlling, monitoring, and protecting the data in these databases should be a top priority of security and privacy teams.

Navigating the CRM Data Landscape: Security, Compliance, and Innovation | Privacy Engineering & Technology Education Discussion (PETed) Recording

Join us for an engaging and informative interactive session featuring Mike Smith, Distinguished Security Architect at Salesforce. Mike is a Fellow of Information Privacy with the International Association of Privacy Professionals (IAPP), and is a seasoned expert in data security, privacy, and compliance, particularly in the world of SaaS applications. In this session, we will explore three critical aspects of managing data and protecting privacy in today’s digital world.

Using ChatGPT (or similar tools) with Privacy Compliance | Privacy Engineering & Technology Education Discussion (PETed) Recording

Join our first webinar in the new IOPD Privacy Engineering & Technology Education Discussion (PETed) Series! The format of the webinar will be a one-hour informal discussion and interaction with members of the IOPD. The goal will be a discussion on how to solve a specific privacy problem or privacy related resource topic and the latest implementation techniques for some of the biggest challenges like synthetic data, zero-knowledge proofs, homomorphic encryption, and translucent databases. The participants will be asked to bring questions related to the topic. Come back the fourth Thursday of every month for a new discussion, new speaker, and new insights on the most cutting-edge privacy challenges!