By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Science Briefing
  • Medicine
  • Biology
  • Engineering
  • Environment
  • More
    • Dentistry
    • Chemistry
    • Physics
    • Agriculture
    • Business
    • Computer Science
    • Energy
    • Materials Science
    • Mathematics
    • Politics
    • Social Sciences
Notification
  • Home
  • My Feed
  • SubscribeNow
  • My Interests
  • My Saves
  • History
  • SurveysNew
Personalize
Science BriefingScience Briefing
Font ResizerAa
  • Home
  • My Feed
  • SubscribeNow
  • My Interests
  • My Saves
  • History
  • SurveysNew
Search
  • Quick Access
    • Home
    • Contact Us
    • Blog Index
    • History
    • My Saves
    • My Interests
    • My Feed
  • Categories
    • Business
    • Politics
    • Medicine
    • Biology

Top Stories

Explore the latest updated news!

Today’s Political Science Science Briefing | March 13th 2026, 1:00:51 pm

Today’s Neurology Science Briefing | March 13th 2026, 1:00:51 pm

Today’s Renewable Energy Science Briefing | March 13th 2026, 1:00:51 pm

Stay Connected

Find us on socials
248.1KFollowersLike
61.1KFollowersFollow
165KSubscribersSubscribe
Made by ThemeRuby using the Foxiz theme. Powered by WordPress

Home - Cybersecurity - The Privacy Audit: Learning from Contact Tracing’s Data Protection Failures

Cybersecurity

The Privacy Audit: Learning from Contact Tracing’s Data Protection Failures

Last updated: March 13, 2026 11:06 am
By
Science Briefing
ByScience Briefing
Science Communicator
Instant, tailored science briefings — personalized and easy to understand. Try 30 days free.
Follow:
No Comments
Share
SHARE

The Privacy Audit: Learning from Contact Tracing’s Data Protection Failures

A forthcoming analysis in Computer Law & Security Review critically assesses the effectiveness of Data Protection Impact Assessments (DPIAs) by examining their application to COVID-19 contact tracing apps. The study by Michael Spratt and TJ McIntyre investigates whether these mandated privacy risk assessments successfully identified and mitigated the significant data security and information security challenges posed by rapid digital surveillance deployment. This research is crucial for understanding how DPIAs function under pressure and their role in compliance frameworks for technologies handling sensitive personal data.

Study Significance: For cybersecurity and risk management professionals, this study offers vital lessons for strengthening incident response and vulnerability assessment protocols. The findings directly inform the development of more robust security policies and compliance strategies for future public health crises or any large-scale deployment of identity and access management systems. It underscores the need for DPIAs to evolve beyond checkbox exercises into dynamic tools for proactive threat intelligence and data breach prevention.

Source →

Stay curious. Stay informed — with Science Briefing.

Always double check the original article for accuracy.

- Advertisement -

Feedback

Share This Article
Facebook Flipboard Pinterest Whatsapp Whatsapp LinkedIn Tumblr Reddit Telegram Threads Bluesky Email Copy Link Print
Share
ByScience Briefing
Science Communicator
Follow:
Instant, tailored science briefings — personalized and easy to understand. Try 30 days free.
Previous Article A Robust Cure for the Winner’s Curse in Genetic Data Science
Next Article Today’s Cell Biology Science Briefing | March 13th 2026, 1:00:51 pm
Leave a Comment Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related Stories

Uncover the stories that related to the post!

A Mathematical Fortress: Using Advanced Geometry to Thwart Cryptanalysis

The GDPR Under Pressure: How the Push for Competitiveness Threatens Data Security

The Cyber Resilience Paradox: Why Preparation Doesn’t Always Prevent Pain

The Measurable Impact of Cyber Resilience on Incident Outcomes

The Privacy Paradox: How Apple’s Tracking Rules Redefine Platform Power

The digital frontier’s new battleground: securing JPEG images from hidden threats

A Legal Shield for Europe’s Cyber Hunters

The Hidden Cost of Resale: Privacy Risks in Second-Hand Gaming

Show More

Science Briefing delivers personalized, reliable summaries of new scientific papers—tailored to your field and interests—so you can stay informed without doing the heavy reading.

Science Briefing
  • Categories:
  • Medicine
  • Biology
  • Social Sciences
  • Gastroenterology
  • Surgery
  • Natural Language Processing
  • Engineering
  • Cell Biology
  • Chemistry
  • Genetics

Quick Links

  • My Feed
  • My Interests
  • History
  • My Saves

About US

  • Adverts
  • Our Jobs
  • Term of Use

ScienceBriefing.com, All rights reserved.

Personalize you Briefings
To Receive Instant, personalized science updates—only on the discoveries that matter to you.
Please enable JavaScript in your browser to complete this form.
Loading
Zero Spam, Cancel, Upgrade or downgrade anytime!
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?