Skip to main content

Coming Next Week: The 12 Days of Privacy

Haul out the holly, fill up the stockings, even though it's just one week past Thanksgiving day.....



Rather than look back at 2013, next week the Privacy & Security blog will count down The 12 Days of Privacy, looking ahead to what we might expect in 2014.    The editor's muse for this series came from our friend and partner, Len Weiser-Varon, who riffed on yesterday's post regarding the latest password hack:


  • 318,000 Facebook accounts
  • 70,000 Gmail, Google+ and YouTube accounts
  • 60,000 Yahoo accounts
  • 22,000 Twitter accounts
  • 8,000 ADP accounts (ADP says it counted 2,400)
  • 8,000 LinkedIn accounts
  • Three French hens
  • Two turtle doves
  • And a password in a pear tree.

In Len's words: This year, a brand new password in an unhacked stocking is a holiday must.

Don't miss our series starting on Monday.

Day One – 12/9 – HIPAA and health privacy in 2014

Day Two – 12/10 -California initiatives and legislation in 2014

Day Three – 12/11 -Hot topics: Geolocation and biometrics

Day Four – 12/12 - The Internet of Things and the FTC in 2014

Day Five – 12/13 - The SEC in 2014

Day Six – 12/16 - US policy initiatives in privacy in 2014

Day Seven – 12/17 -- Children’s privacy issues in 2014

Day Eight – 12/18 – Mobile privacy and mobile apps in 2014

Day Nine – 12/19 -EU privacy issues in 2014 (the coming cross-border sturm und drang)

Day Ten – 12/20 -- Employment and workplace privacy issues to watch out for in 2014

Day Eleven – 12/21 - Privacy class action issues in 2014

Day Twelve – 12/24 – D&O, directors’ risks and cyberliability insurance issues to consider in 2014


Subscribe To Viewpoints


Cynthia J. Larose

Member / Chair, Privacy & Cybersecurity Practice

Cynthia J. Larose is Chair of the firm's Privacy & Cybersecurity Practice, a Certified Information Privacy Professional-US (CIPP-US), and a Certified Information Privacy Professional-Europe (CIPP-E). She works with clients in various industries to develop comprehensive information security programs on the front end, and provides timely counsel when it becomes necessary to respond to a data breach.