Top 10 Privacy Issues for 2011 - Slide 7

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Top 10 Privacy Issues for 2011-7 Next

At least one company will be prosecuted under the broad-reaching Massachusetts Privacy Law (201 CMR 17.00). In March of this year, the Massachusetts Privacy Law went into effect, mandating that any company that "owns or licenses" personal information -- whether stored in electronic or paper form -- about Massachusetts residents must comply with its privacy requirements, including notification of breaches and encryption of stored or transmitted personal data. Although the state has yet to enforce the law, 2011 will likely be the year that companies begin seeing penalties. In addition, we may see more laws of this type passed in 2011. Nevada also has a similar law.

The prevalence of mobile devices with personally identifiable location-based information and the increasing use of social media are top concerns for 2011, according to Proofpoint, Inc., a leading provider of SaaS e-mail security, e-mail archiving and data loss prevention solutions. With more personal information available on the Internet, in everyday consumer applications and stored in corporate databases, risks to consumers and companies will only grow in the next year. In addition, increasing regulations and new laws will force many organizations in 2011 to review their handling of private information and implement new programs to minimize their risks. To deal with these increasing threats and obligations, Proofpoint expects more organizations to create stronger privacy policies and turn to encryption, Web filtering and secure managed file transfer.

Proofpoint predicts the following trends will dominate privacy discussions in 2011:

More Slideshows:


20 Hot IT Job Markets Cities showing the highest rate of IT job growth according to Dice.com

10 Top Google Apps for Document Management 10 of the highest-rated apps for document management from the Google Apps Marketplace.


Top 10 Best Practices for Data Integration Use these guidelines to help you achieve more modern, high-value and diverse uses of DI tools and techniques.

 

Related Topics : E-mail Security, E-mail Servers, Passwords, Security Metrics, Spam

 
More Slideshows

The Spam Dirty Dozen: Top Spam-Relaying Countries for Q3 2012

IT security and data protection firm Sophos has published its latest 'Dirty Dozen' report of spam-relaying countries for the third quarter of 2012. ...  More >>

Security and Compliance: Violations and Lack of Confidence Are Widespread

Research shows lack of confidence in and widespread violations of corporate security and compliance policies. ...  More >>

Nine Document Security Tips Nine Tips to Keep Your Electronic Documents Secure

Tips to help ensure that your electronic document repository is 100 percent secure. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.