Subscribe to LexTalk to stay on top of today’s legal issue and trends.
Catapult Your Career |
Industry Insights & Trends |
Product Training & Tips
We all have been in this situation; we are sitting in a waiting room with a bunch of strangers and there is nothing but silence. Imagine how caught off guard any of us would be if a complete stranger (to us) came up and started talking to us about very personal details of our lives. I bet there are a lot of terms we could to use to describe our reaction- creeped out being one of them. Regardless how creepy this may be, it is also quite possible given how connected we are to technology. According to We Live Security, this revelation begs the question – who owns this digital me?
Andrew Lee, keynote speaker at Segurinfo Argentina 2015, illustrated a hypothetical case where a company refuses to extend medical insurance to person because, according to the description:
“we know he has heart problems, and that he ordered butter in the supermarket, which was home-delivered and is being stored in his smart refrigerator”.
Lee points out that all our data is handled and dispersed by third parties such as governments, enterprises and retailers. Aspects of our lives such as where we buy food (as noted in situation above) create our data identity which can be searched and traced by others. What is scary about it is that it gives others a picture of ourselves that is just as recognizable as we would be in person.
The downfall regarding this digital revolution is that soon nothing will be considered private. Everything aspect of our live will be obtainable through some object or device, but Lee explained there is a way to avoid that. What way would that be? By being transparent.
“Privacy is the new frontier of security. Ironically, more transparency will create improved privacy, if we know how they work and what they are used for, so we can control them”.
The environment around us will continue to evolve into a more advanced digital world. In the end, in order to reclaim ownership of our identities and avoid any future problems we have to adapt fast enough to the changes that we may face moving forward.
While many companies have implemented robust due-diligence vetting, monitoring and auditing strategies for managing third-party risk, no due-diligence system is foolproof in identifying high-risk business partners or predicting which partners will engage in bribery and where they might conspire with employees to circumvent even the best-intentioned vetting process.
Join Robert Appleton and Richard Bistrong as they discuss how due-diligence systems, and monitoring and auditing strategies can be used to identify sophisticated bribery schemes in today’s evolving global economy.
Date: Thursday, August 6, 2015 Time: 2 – 3:35 P.M. ET (11 A.M. – 12:35 P.M. PT) Duration: 95 minutes
Register Now >>