Articles from Around the Web

Discover the latest industry insights and developments with our News from Around the Web page. We curate feeds from a variety of reputable organizations, bringing you a comprehensive overview of relevant news and trends. Stay informed and connected with the most current updates from across the web.

A view from DC: Crisis and compromise

IAPP Managing Director, Washington, D.C., Cobun Zweifel-Keegan, CIPP/US, CIPM, looks at the latest privacy developments in the nation's capital, including efforts to tackle what may be the "midlife of internet policymaking." Zweifel-Keegan said, "there is so much yet to tackle: from competition to censorship to CSAM to cybersecurity to, of course, data privacy and algorithmic harms." He explores discussions unfolding and potential solutions, and compromises, being offered.Full Story

European Commission releases digital identity wallet framework

The European Commission released the "European Digital Identity Wallet Architecture and Reference Framework." The document, part of the EU's toolbox toward implementing a European Digital Identity Framework, is intended to "provide all the specifications needed to develop an interoperable EUDI Wallet Solution based on common standards and practices" and will be "complemented and updated over time through the process of establishing the toolbox."

Saudi Data and AI Authority launches regulatory sandbox

The Saudi Data and Artificial Intelligence Authority launched the Data and Privacy Regulatory Sandbox offering guidance, consultations and expertise to "capitalize on the value of data" while "safeguarding consumers' personal data rights." The SDAIA said the sandbox aims to "encourage technological innovation in the fields of data and privacy" and ensure data privacy laws and regulations keep pace with "industry technical progre

How to effectively ‘pen’ test your privacy program

As privacy compliance checks in litigation and regulatory enforcement become more comprehensive, one way to evaluate a company’s privacy program is through a penetrative test of its cybersecurity controls, Baker McKenzie’s Brian Hengesbaugh, Cristina Messerschmidt and Jerome Tomas write. A "pen" test includes identifying key elements of compliance in a company's privacy program to test, deciding what applications are “in-scope” of the exercise and reporting findings “in the form of privileged legal memorandums” that outline recommendations.