Latest news and opinions from the Bamboo Team

Trends Sharon Bauer Trends Sharon Bauer

MSP’s Journey Towards Privacy Compliance

Whether you are a managed service provider (“MSP”) or a managed security service provider (“MSSP”), you are likely collecting, storing, reviewing, using, or disclosing personal information from your client. Most MSSPs need to comply with privacy legislation as both a regulatory and contractual requirement. This article serves to provide MSPs and MSSPs considerations towards becoming privacy compliant.

Read More
Best Practice Albina Magomedova Best Practice Albina Magomedova

The Art of Selling Privacy

Last week, Bamboo hosted a Privacy & Retail Workshop with several national retailers in attendance. This workshop was a huge success! The discussions in the room focused on privacy implementation in retail and facilitated the exchange of lessons learned and how to grow a business alongside privacy compliance. What stood out most to the Bamboo team was the undeniable truth of the shared challenge every retailer faces on the journey to bolstering their company’s privacy posture – communication.

Read More
Security Ross Saunders Security Ross Saunders

Seeing the Forest from the Trees: Don’t Neglect the Fundamentals

When it comes to securing our environments, the controls we have in place work in harmony to keep our kingdoms safe. A layered approach means that there are many different controls that serve the purpose of securing your environment, so that if one fails, another takes over. With layers comes complexity, and it’s important to not lose sight of fundamental controls that are almost “a given” in favour of the more detailed controls on our hosted environments.

Read More
Privacy, Best Practice, Security Ross Saunders Privacy, Best Practice, Security Ross Saunders

The Eternal Push and Pull: Striking a Balance between Endpoint Protection and Employee Privacy

At Bamboo we’re constantly aware of the push and pull nature between privacy and security, and often it comes to the fore in processes such as incident response or considerations around data lakes and operational data. In the last few weeks though, we’ve seen a great deal of discussion around Data Leak Prevention (DLP) and endpoint protection, and the clash it has against employee privacy – particularly when Bring Your Own Device (BYOD) is involved.

Read More
Privacy Sharon Bauer Privacy Sharon Bauer

Privacy Complaint: Naming & Shaming

The article discusses the implications of someone filing a privacy complaint with the Office of the Privacy Commissioner of Canada (OPC) and the motivation of naming and shaming companies. It highlights that even if a complaint seems frivolous, it can lead to thorough investigations by the OPC, potentially uncovering compliance gaps within a company's privacy program. The article emphasizes the importance of proactive preparation for businesses, including maintaining updated policies, designating a Privacy Officer, and viewing every decision through the lens of potential regulatory scrutiny. It warns that regardless of the company's size or industry, a single complaint can have significant financial, operational, and reputational consequences, stressing the necessity for vigilance in addressing privacy concerns in the digital age.

Read More
Privacy Sharon Bauer Privacy Sharon Bauer

Retail Loss Prevention and In-Store Privacy: A Guide

In recent years, Canada has experienced a concerning surge in shoplifting incidents, a trend potentially exacerbated by economic factors such as inflation. As the guardians of a retailer's assets, loss prevention personnel find themselves on the frontline in addressing this growing challenge. However, in the pursuit of securing business interests, it is imperative to recognize the delicate dance between protecting assets and upholding privacy rights.

Read More
Privacy Ross Saunders Privacy Ross Saunders

Phish in a Barrel: How Sensitive Data is Vulnerable to Email Breaches

As an immigrant to Canada, I have seen the process and the documentation required to get here. My entire life condensed into a folder to be submitted to a consultant, who will in turn validate everything, and then submit it all to the IRCC (Immigration, Refugees and Citizenship Canada). This translates to a lot of deeply personal information put into the trust of a third-party, and this article goes into how quickly a phishing attack on any business can put sensitive information at risk.

Read More
Best Practice Lauren Preston Best Practice Lauren Preston

Refined Guidance on Valid Consent

The criteria for obtaining lawful consent was discussed in depth in our Law 25 Consent White Paper released late 2023. The CAI published its final consent guidelines (Guidelines 2023-1-Consent: Validity Criteria (“Consent Guidelines”)) providing us with a clearer picture and refined guidance on what is required for consent to be valid.

Read More
Privacy, Security, Trends Ross Saunders Privacy, Security, Trends Ross Saunders

Wonder Twin Powers: The (Super)Power of Addressing Privacy and Security Together

In a world where data breaches and privacy concerns are constantly in the headlines, it’s more crucial than ever for businesses to prioritize and navigate both privacy and security. While these concepts are often treated as separate entities, tackling them together can yield significant benefits for organizations.

Read More
Trends, Privacy, Security Sharon Bauer Trends, Privacy, Security Sharon Bauer

Integrative Thinking - The Cross-Pollination of Privacy and Security

The privacy and security functions, respectively, often have tunnel vision and move in different directions causing the business to spin rather than move forward fast. It is time for privacy and security to form an alliance. When privacy and security cross-pollinate to form Governance, Privacy, and Security (GPS), they are better able to protect the business, protect data, and protect individuals.

Read More
GDPR Sharon Bauer GDPR Sharon Bauer

I Know You Are But What Am I?

Can personal data be anonymized for one party while identifiable for another party? This has been a long-standing question and we finally have an answer. Processors who tokenize data should be aware of this new CJEU ruling to determine if they need to comply with the GDPR or any other privacy legislation.

Read More
Best Practice Ross Saunders Best Practice Ross Saunders

The Challenge of Public Expectation

When dealing with privacy and security, everyone jumps straight onto the compliance bandwagon. There are set laws, frameworks, regulations, standards and other checklists that allow you as a business to proudly state that you are compliant. But does ‘to-the-letter’ compliance match the public’s expectations?

Read More
Best Practice Lauren Preston Best Practice Lauren Preston

Consent - The Key to Trust and Respect of Customers

Like Europe and the UK, Quebec’s Law 25 has moved closer to ensuring that customers control how, when, and where their personal information is processed. Consent ensures that your customer’s personal information is treated like the precious cargo it is – handled with care and not tossed into the sea of manipulation. Consent allows the customer to set boundaries and feel like they are driving.

Read More
Best Practice Ross Saunders Best Practice Ross Saunders

Navigating the Tightrope: Balancing Security and Privacy Conflicts

In today's digital landscape, businesses face an ongoing struggle to strike the right balance between security and privacy. While robust security measures are essential to protect sensitive data and assets, maintaining customers’ and employees’ privacy is equally important to establish trust and comply with regulations. Privacy by Design (PbD) incorporates this as a principle (more on that in a future article), stating that it should not be a “zero sum” game; privacy and security should work together and not be in competition of one or the other.

Read More
Best Practice Ross Saunders Best Practice Ross Saunders

Help Clients Help Themselves: Privacy and Security in On-Premises Deployments

When you are a SaaS provider, you have control over the software you develop, as well as the deployment processes. You are good at securing your cloud and ensuring privacy legislation is adhered to. But, what happens when you offer an on-premises or hybrid solution that clients deploy on their own (or with your assistance)? How do you ensure that the software is still being kept in a secure state and that there won’t be any collateral damage and finger pointing should something go horribly wrong?

Read More
Best Practice Ross Saunders Best Practice Ross Saunders

Ready. Set. ISO!

We’ve seen a significant increase in the number of security assessments our clients are receiving from their own clients. For the more medium-size company, it starts becoming pertinent to align to a particular standard, of which there are many to choose from, each with their own merits and focus areas. One such standard that is very widely recognised, is ISO 27001.

Read More
Best Practice Ross Saunders Best Practice Ross Saunders

Removing the Blinkers: Assessing the PrivSec Threats to your Business

What happens when you cannot see the forest for the trees? There are so many threats out there it’s hard to keep up with which ones directly (and materially) affect your business. Businesses can waste tremendous time and effort in addressing generic threats that do not directly relate to their business, simply because it seemed like a good idea (or someone in power heard about it at the last conference they attended).

Read More
Privacy Sharon Bauer Privacy Sharon Bauer

Behind the Headset: The Privacy Pitfalls of Call Centres and How They're Putting Your Business at Risk

Call centres are often the first point of contact between customers and businesses. Over the past few years, with advances in technology, including AI, call centres are collecting more personal information than before and using it in novel ways. This article explores how call centres may violate privacy and what they can do to reduce their risk of non-compliance.

Read More
Privacy Lauren Preston Privacy Lauren Preston

The Invisible Stalker - How to handle geolocation data

Collecting geolocation information can be useful to your business, however, if not done properly, not only will you be non-compliant with privacy regulations, get fined, and find your company in a class-action lawsuit, but you will be classified as that “creepy stalker” that nobody wants to associate with. Read up on the latest cases involving geolocation data.

Read More