|By PR Newswire||
|March 13, 2014 09:02 AM EDT||
SAN FRANCISCO, March 13, 2014 /PRNewswire/ -- TRUSTe, the leading global data privacy management company and the first approved Accountability Agent for the Asia-Pacific Economic Cooperation (APEC) Cross Border Privacy Rules (CBPR) System, announced today that two additional companies have achieved APEC Certification through TRUSTe. This follows the announcement last Thursday by the FTC, together with agency officials from the European Union and APEC economies, with the ultimate goal of helping businesses transfer data around the world in a safe way in compliance with global privacy frameworks.
Lynda.com and Yodlee are the two latest companies to be certified in compliance with the APEC Cross Border Privacy Rules in addition to IBM and Merck. Commenting on their APEC Certification, David Glaubke, Director of Corporate Communications at Lynda.com said:
"Lynda.com is committed to protecting the privacy of our users, and the APEC Privacy Certification helps protect the exchange of personal information across borders, which is vital to our business. As we continue to grow in different regions throughout the world, we want to continue to build trust with our users, address concerns about privacy and be transparent about our data privacy practices."
The EU-APEC Referential announced last week, maps together the requirements for APEC Cross Border Privacy Rules (CBPRs) and EU Binding Corporate Rules (BCRs). The document, jointly designed by APEC officials and the EU's Article 29 Data Protection Working Party, is designed to be a practical reference tool for companies that seek "double certification" under these APEC and EU systems, and shows the substantial overlap between the two.
Chris Babel CEO TRUSTe welcomed the announcements saying:
"The safe handling of customers' personal information is crucial for the success of businesses as they enter new markets with different privacy frameworks. Now more than ever the challenge of dealing with global data privacy landscape couldn't be more apparent.
"At TRUSTe we have been working closely on the development of the CBPR framework since 2007 including participating in the US delegation to APEC and have been the Accountability Agent in the US since last June. We've also partnered with Promontory to help clients seeking a BCR solution for data compliance in the EU.
"Through this work, we understand the practical challenges that these differing privacy frameworks create for companies looking to act responsibly in their use of customer data. We welcome the announcement made by EU agencies and APEC economies which will make it easier for companies to demonstrate global compliance under international standards and is an exciting step towards further interoperability of privacy frameworks worldwide."
Simon McDougall Managing Director and Head of Promontory's Privacy Practice said:
"One of the biggest challenges for all international firms is managing the diverse range of privacy regimes around the world. Any effort among regulators to share information and work towards greater co-ordination is clearly positive. Promontory's work with TRUSTe on BCRs is also aimed at helping organizations to manage diverse privacy rules, so we appreciate the practical challenges."
In order to help companies better understand the new EU-APEC Referential, and how they can achieve global privacy compliance via the APEC and BCR Frameworks, TRUSTe is hosting a webinar on March 25 with Josh Harris, Policy Director at the Future of Privacy Forum, Simon McDougall, Managing Director at Promontory and Saira Nayak, Policy Director at TRUSTe. Register here for further details.
About APEC Cross Border Privacy Rules
The APEC CBPR System is a self-regulatory initiative that addresses cross border data flows between the United States and other APEC Member Economies, through voluntary and enforceable codes of conduct adopted by participating businesses. TRUSTe was approved as the first Accountability Agent for the APEC CBPR System in June 2013. Additional details about the TRUSTe APEC Privacy program are available at: www.truste.com/apec
About Binding Corporate Rules
BCRs are designed to allow multinational companies to transfer personal data from the European Economic Area (EEA) to their affiliates located outside of the EEA in compliance with Data Protection Directive 95/46/EC. Applicants must demonstrate that their BCRs put in place adequate safeguards for protecting personal data throughout the organization in line with the requirements of the Article 29 Working Party papers on Binding Corporate Rules. TRUSTe and Promontory launched a joint BCR Management Program in February 2013. Additional details are available at: http://www.truste.com/bcr
TRUSTe is the leading global Data Privacy Management (DPM) company and powers trust in the data economy by enabling businesses to safely collect and use customer data across web, mobile, cloud and advertising channels. Our cloud-based Data Privacy Management Platform delivers innovative technology products, including website monitoring and advertising compliance controls – along with privacy assessments and certifications. More than 5,000 companies worldwide, including Apple, Disney, eBay, Forbes, LinkedIn and Oracle rely on our DPM platform and globally recognized Certified Privacy Seal to protect/enhance their brand, drive user engagement and minimize compliance risk. For more information, please see http://www.truste.com
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete...
Dec. 27, 2014 12:00 AM EST Reads: 2,579
There's Big Data, then there's really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at Big Data Expo®, Hannah Smalltree, Director at Treasure Data, discussed how IoT, Big D...
Dec. 26, 2014 04:00 PM EST Reads: 2,232
SYS-CON Events announced today that Gridstore™, the leader in hyper-converged infrastructure purpose-built to optimize Microsoft workloads, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Gridstore™ is the leader in hyper-converged infrastructure purpose-built for Microsoft workloads and designed to accelerate applications in virtualized environments. Gridstore’s hyper-converged infrastructure is the ...
Dec. 26, 2014 04:00 PM EST Reads: 1,856
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
Dec. 26, 2014 01:00 PM EST Reads: 2,644
The Internet of Things promises to transform businesses (and lives), but navigating the business and technical path to success can be difficult to understand. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, demonstrated how to approach creating broadly successful connected customer solutions using real world business transformation studies including New England BioLabs and more.
Dec. 26, 2014 01:00 PM EST Reads: 2,071
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
Dec. 26, 2014 12:30 PM EST Reads: 1,897
Dec. 26, 2014 12:00 PM EST Reads: 1,726
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
Dec. 26, 2014 11:15 AM EST Reads: 2,369
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective ...
Dec. 26, 2014 11:00 AM EST Reads: 1,956
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
Dec. 26, 2014 11:00 AM EST Reads: 2,108
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series dat...
Dec. 26, 2014 11:00 AM EST Reads: 2,193
"SAP had made a big transition into the cloud as we believe it has significant value for our customers, drives innovation and is easy to consume. When you look at the SAP portfolio, SAP HANA is the underlying platform and it powers all of our platforms and all of our analytics," explained Thorsten Leiduck, VP ISVs & Digital Commerce at SAP, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 26, 2014 11:00 AM EST Reads: 1,834
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...
Dec. 26, 2014 11:00 AM EST Reads: 2,037
Fundamentally, SDN is still mostly about network plumbing. While plumbing may be useful to tinker with, what you can do with your plumbing is far more intriguing. A rigid interpretation of SDN confines it to Layers 2 and 3, and that's reasonable. But SDN opens opportunities for novel constructions in Layers 4 to 7 that solve real operational problems in data centers. "Data center," in fact, might become anachronistic - data is everywhere, constantly on the move, seemingly always overflowing. Net...
Dec. 26, 2014 10:00 AM EST Reads: 2,018
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
Dec. 26, 2014 10:00 AM EST Reads: 1,810