Best Practices

Roundtable: Are current models of data protection fit for purpose? Understanding the consequences for economic development

WPF’s Executive Director Pam Dixon will be moderating a Center for Global Development roundtable May 20 to discuss data governance models from the perspective of low and middle income countries. This is part of her ongoing work as co-chair of the Governing Data for Development project working group. Michael Pisa, CGD Policy Fellow and lead for

Governing Data for Development: Trends, Challenges, and Opportunities

The World Privacy Forum is pleased to announce its work on a new project with the Center for Global Development (CGD). This project, Governing Data for Development, is led by CGD, with WPF’s Executive Director Pam Dixon as co-chair of the project working group with co-chair and Oxford professor Benno Ndulu, who is also the former Governor of the Central Bank of Tanzania. The project, which has been underway for a year, has produced its first report, which is a scoping report based on interviews with key stakeholders. This blog post, which provides background on the project and links to the first project report, is being jointly posted at WPF and CGD.

Age Appropriate Design: new code of practice regarding online services for children from the UK Information Commissioner

The UK Information Commissioner’s Office has published a new code of practice for online services directed to children, Age appropriate design: A code of practice for online services. The new code sets 15 flexible standards and gives specific explanations of how the GDPR applies to childrens’ online activities and pursuits. The code is not a

Health Industry Cybersecurity Practices: New consensus practices and tools from HHS

The US Department of Health and Human Services (HHS) has produced a set of cybersecurity resources for healthcare provider organizations from small to large. So far, HHS has published four documents: an overview report of cybersecurity issues and practices, two technical volumes, and a toolkit. The documents focus on what an expert multistakeholder consensus group determined to be the five most prevalent cybersecurity threats and the ten core cybersecurity practices. The practices are voluntary, and utilize the NIST cybersecurity framework. The documentation is based in reality, not conjecture, and the documents are not intended to sell any particular products for any particular vendor. This has allowed for a rich and helpful documentation of current challenges along with solutions. See our overview of the four new resources.