Looking Toward the Future: Building a Safe, Secure, and Private Internet for Everyone
Join us for another event in a series on privacy, security, and online safety for young people in Australia. Looking Toward the Future: Building a Safe, Secure, and Private Internet for Everyone, takes place on Wednesday, September 4, 9 am – 11 am Australian Eastern Time. In our increasingly digital world, the boundaries of our […]
FPF Highlights Intersection of AI, Privacy, and Civil Rights in Response to California’s Proposed Employment Regulations
On July 18, the Future of Privacy Forum submitted comments to the California Civil Rights Council (Council) in response to their proposed modifications to the state Fair Employment and Housing Act (FEHA) regarding automated-decision systems (ADS). As one of the first state agencies in the U.S. to advance modernized employment regulations to account for automated-decision […]
Consumer Health Data Privacy Notices by the Numbers
Today, FPF is releasing an infographic that provides insights into how organizations are responding to the transparency requirements of recently enacted U.S. state health privacy laws. The infographic reflects a survey of privacy notices on the websites of 180+ companies across a variety of industries and sectors, from pharmaceutical to apparel. Two key laws enacted […]
Consumer Health Data Privacy Notices by the Numbers
Today, FPF is releasing an infographic that provides insights into how organizations are responding to the transparency requirements of recently enacted U.S. state health privacy laws. The infographic reflects a survey of privacy notices on the websites of 180+ companies across a variety of industries and sectors, from pharmaceutical to apparel.
Contextualizing the Kids Online Safety and Privacy Act: A Deep Dive into the Federal Kids Bill
Co-authored by Nick Alereza, FPF Policy Intern and student Boston University School of Law. With contributions from Jordan Francis. On July 30, 2024, the U.S. Senate passed the Kids Online Safety and Privacy Act (KOSPA) by a vote of 91-3. KOSPA is a legislative package that includes two bills that gained significant traction in the […]
FPF Member Training 2025 – Faculty Page
FPF Training program faculty Connecting You with FPF Experts The FPF Training Program offers an in-depth understanding of today’s most pressing privacy and data protection topics. MEET OUR TRAINING FACULTY FPF TRAINER FEEDBACK
Final-Privacy-Principles-Edits-2
SEPTEMBER 2018 1 PRIVACY PRINCIPLES FOR FACIAL RECOGNITION TECHNOLOGY IN COMMERCIAL APPLICATIONS INTRODUCTION The consumer – facing applications of facial recognition technology continue to evolve and appear in new contexts . There are several key functions that benefit from facial recognition technology , including : (1) safety and security; (2) access and authentication; (3) photograph […]
FPF Samsara Video-Based VSS Whitepaper PRINT R1 wBleed
VIDEO-BASED VEHICLE SAFETY SYSTEMS: Lessons Learned from Commercial Fleets J U LY 2 0 2 4 FUTURE OF PRIVACY FORUM | J U LY 2 0 2 4 1 The Future of Privacy Forum (FPF) is a non-profit organization that serves as a catalyst for privacy leadership and scholarship, advancing principled data practices in support […]
Reflections on California’s Age-Appropriate Design Code in Advance of Oral Arguments
Co-authored with Isaiah Hinton, Policy Intern for the Youth and Education Team Update: On Wednesday, July 17th, the U.S. 9th Circuit Court of Appeals heard oral arguments for an appeal of the District Court’s preliminary injunction of the California Age-Appropriate Design Code Act (AADC). Judges Milan Smith Jr., Mark Bennett, and Anthony Johnstone appeared interested […]
NEW FPF REPORT: Confidential Computing and Privacy: Policy Implications of Trusted Execution Environments
Written by Judy Wang, FPF Communications Intern Today, the Future of Privacy Forum (FPF) published a paper on confidential computing, a privacy-enhancing technology (PET) that marks a significant shift in the trustworthiness and verifiability of data processing for the use cases it supports, including training and use of AI models. Confidential computing leverages two key […]