One Size Won’t Fit All: Multinational Corporations’ Compliance with Privacy Regulations (Part 3 of 3)

Part 3: Proposed Solutions This is the third and final post in a three-part blog post examining privacy issues confronting multinational corporations in a global economy. The first post explored privacy generally by analyzing privacy as the concept is understood and applied in the European Union, in China, and in the United States. The second … Read more

One Size Won’t Fit All: Multinational Corporations’ Compliance with Privacy Regulations (Part 2 of 3)

Part 2: Privacy Approaches Applied This is the second post in a three-part blog post examining privacy issues confronting multinational corporations in a global economy. The first post explored privacy generally by analyzing privacy as the concept is understood and applied in the European Union, in China, and in the United States. This post will … Read more

One Size Won’t Fit All: Multinational Corporations’ Compliance with Privacy Regulations (Part 1 of 3)

Part 1: What Does “Privacy” Mean? This is the first post in a three part series examining the issues multinational corporations face in complying with privacy regulations in the U.S. and abroad. This post will explore privacy generally by analyzing privacy as the concept is understood and applied in the European Union, in China, and … Read more

Critical Analysis: Data Breaches Signify Need for Unified Data Protection Laws

If you are reading this blog post then you have access to the internet, a network that you are currently sharing with 2.4 billion other people, some of which may not have your best interests at heart. Many people use this network for daily activities, ranging from shopping to social networking. As internet users interact … Read more

Critical Analysis: The Changing Landscape of International Privacy

In the weeks and months to come, the international community will see the deployment of a number of new privacy initiatives.  The new privacy laws are likely to have been spurned by several factors including: the need to update existing laws that are nearly 20 years old; data breaches and government leaks; and the increasing … Read more