Karen Lawrence Öqvist
So my daughter orders some LED lights for her room, beautiful multicoloured flashing lights arrived on Friday from HongKong. There was an App which came with the lights, to download and have some fun. A control did come with the lights too, but you could do much more with the App. When I received a request for the password of our home network. Why the hell does an App need a password to my network, her iPhone has access? I wonder how many homes the Chinese have access to in EEA countries?
By itself, the document is indeed useful and can be of help, as it provides an overview of 18 data breach scenarios and additionally compiles recommendations on TOMs for preventing / mitigating the impact of attacks or risk sources. But stop! Guidelines on Examples? Guidelines, strictly speaking, like a gleaming beacon in the dark, must give readers a clear methodology on how to tackle practical issues. Guidelines cannot just outline examples of some cases; otherwise, those are not guidelines ...
Yes, privacy is starting to be really cool indeed...
As you may probably know, Google, a.k.a 'the global scourge' in the privacy world, has some time ago made an attempt to improve its reputation and roll out so-called ‘Privacy Sandbox’ project. Its main idea is to remove third-party cookies (always problematic to data subject rightsh per se) and replace them with some other technologies. Being a by no means uncontroversial project from a privacy standpoint (e.g., trust tokens, one of the suggested replacements for third-party cookies, allow to ...