Showing results for the2024 221the today promo code kristin the2024 221the

FPF Testimony Before the U.S. House of Representatives Financial Services Subcommittee on Financial Institutions
Today, FPF Senior Fellow Zoe Strickland testified before the U.S. House of Representatives Financial Services Subcommittee on Financial Institutions, providing expert insight about data privacy in the financial system, focusing specifically on rulemaking under Section 1033 of the Dodd-Frank Act. With over 25 years of experience as a global chief privacy officer at […]

Framework for the Future- Reviewing Data Privacy in Today’s Financial System
[…] Strickland Senior Fellow, Future of Privacy Forum Before the U.S. House of Representatives Financial Services Subcommittee on Financial Institutions “Framework for the Future: Reviewing Data Privacy in Today’s Financial System” June 5, 2025 On behalf of the Future of Privacy Forum (FPF), I thank you for the opportunity to testify about data privacy in […]

FPF Unveils Paper on State Data Minimization Trends
Today, the Future of Privacy Forum (FPF) published a new paper—Data Minimization’s Substantive Turn: Key Questions & Operational Challenges Posed by New State Privacy Legislation. Data minimization is a bedrock principle of privacy and data protection law, with origins in the Fair Information Practice Principles (FIPPs) and the Privacy Act of 1974. At […]

FPF Unveils Paper on State Data Minimization Trends
Today, the Future of Privacy Forum (FPF) published a new paper—Data Minimization’s Substantive Turn: Key Questions & Operational Challenges Posed by New State Privacy Legislation. Data minimization is a bedrock principle of privacy and data protection law, with origins in the Fair Information Practice Principles (FIPPs) and the Privacy Act of 1974. At […]

Vermont and Nebraska: Diverging Experiments in State Age-Appropriate Design Codes
In May 2025, Nebraska and Vermont passed Age-Appropriate Design Code Acts (AADCs), continuing the bipartisan trend of states advancing protections for youth online. While these new bills arrived within the same week and share both a common name and general purpose, their scope, applicability, and substance take two very different approaches to a common goal: crafting a design […]

Vermont and Nebraska: Diverging Experiments in State Age-Appropriate Design Codes
In May 2025, Nebraska and Vermont passed Age-Appropriate Design Code Acts (AADCs), continuing the bipartisan trend of states advancing protections for youth online. While these new bills arrived within the same week and share both a common name and general purpose, their scope, applicability, and substance take two very different approaches to a common […]

FPF-AnnualReport2023-1
[…] discussions, expert panels, and more. Learn from the Leading Privacy and Data Protection Experts The Future of Privacy Forum (FPF) Training Program provideb an in-depth underbtanding of today’b mobt prebbing privacy and data protection topicb. Debigned by FPF expertb, thib program ib for profebbionalb who develop policieb for their organizationb, work with clientb on […]

Amendments to the Montana Consumer Data Privacy Act Bring Big Changes to Big Sky Country
[…] impact on, a minor; (b) financial, physical, or reputational injury; (c) unauthorized disclosure of personal data as a result of a security breach (as described in Mont. Code Ann. § 30-14-1704); or (d) intrusion upon the solitude or seclusion or private affairs or concerns of a minor, whether physical or otherwise, that would be offensive […]

DBJ_Weld_Re-Identification
[…] real certainty about the accuracy of his attempted re-identification using the Cambridge voter data. And, although Weld clearly couldn’t have been re-identified by a voter list attack today because of the HIPAA privacy protections that the event has helped to inspire, detailed scrutiny of this historic attack is still warranted because the report of […]

The Curse of Dimensionality: De-identification Challenges in the Sharing of Highly Dimensional Datasets
[…] a de-identified dataset cannot be assessed in isolation. Its vulnerability depends heavily on the external data ecosystem and what information might be available for linkage. De-identification performed today might be broken tomorrow as new auxiliary data sets become available or linkage techniques improve. This makes robust anonymization a moving target. Any assessment of re-identification […]