Using Overt Video Surveillance in WashingtonTag: surveillance
Installing surveillance equipment may seem like a logical decision for your organization, but collection and use of personal information through video surveillance may violate privacy law and could lead to other costly liabilities.
Threat modelingTag: Threat modeling
Threat modeling is an approach for analyzing the security of an application.
Risk Assessment When a Breach has OccurredTag: Data breach
Now that you have discovered a breach occurred what do you do.
So you think you’ve been hacked - What Now?Tag: Hacking
Computer attacks are part of modern life. While we can all fall victim to malicious hackers, it is the elderly and novice computer users who are most frequently targeted.
Publishing Open DataTag: Open Data Champion
Open data is the concept that some data should be freely available for everyone to use and republish.
Privacy By DesignTag: Design
Privacy by Design is a concept that privacy measures and considerations are made throughout the entire process / product development lifecycle.
Phishing scamsTag: Phish / variations thereof
Phishing scams are one of the most common forms of security breaches for individuals as well as organizations because these scams rely on human error.
Multi-factor authenticationTag: MFA
Multi-Factor Authentication (MFA) is a multi-step login process that provides an extra layer of security by requiring an additional factor (or factors) to be provided in the authentication process.
Privacy and Data Protection
Since our inception at the beginning of 2016, the Office of Privacy and Data Protection has been chartered as the focal point for privacy efforts in Washington state.
The Office of Privacy and Data Protection announces beta testing of “Privacy Modeling,” a new web application that identifies the privacy laws relevant to the product or service you wish to create.