{"id":535,"date":"2022-04-05T16:04:12","date_gmt":"2022-04-05T14:04:12","guid":{"rendered":"https:\/\/stage.usercentrics.com\/?post_type=on_demand_webinar&#038;p=22970"},"modified":"2024-09-11T14:22:18","modified_gmt":"2024-09-11T12:22:18","slug":"privacy-world-reimagined","status":"publish","type":"event","link":"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/","title":{"rendered":"Privacy World reimagined: How to leverage data with the future of privacy"},"content":{"rendered":"\n<p>Just about every corner we hear new terms popping up- the metaverse, blockchain and most importantly when it comes to privacy: Smartcities.<\/p>\n\n\n\n<p>Smart cities are the future \u2013 there\u2019s no denying that. Like in other industries before, technology will continue to intertwine with city services and infrastructure until most major cities can be categorised as a smart city. But if governments hope to respect their citizens\u2019 right to privacy, standards will need to be set. Governments and businesses will need to work together and install security safeguards for citizens.<\/p>\n\n\n\n<p>So just how secure is the data that is generated by IoT devices and more future oriented technologies? How can this data be used? And which approaches can be taken when it comes to complying within these new areas in order to create user trust?<\/p>\n\n\n\n<p>And most importantly, where can companies place their focus when it comes to leveraging data in these areas?<\/p>\n\n\n\n<p>Watch this webinar now to have all of your questions answered in this fascinating, future oriented debate.<\/p>\n\n\n\n<p><em>\u00b9the webinar partners are GEIE ERCIM, Debbie Reynolds Consulting LLC and Ward PLLC<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How secure is data gained by IoT devices &#038; other future-oriented technologies? Learn approaches to take to comply with privacy laws.<\/p>\n","protected":false},"featured_media":5615,"template":"","meta":{"_acf_changed":false,"editor_notices":[]},"tags":[],"magazine_issue":[],"magazine_tag":[],"resource_tag":[19,14],"class_list":["post-535","event","type-event","status-publish","has-post-thumbnail","hentry","resource_tag-tech-that-talks","resource_tag-privacy"],"acf":[],"yoast_head":"<title>Privacy World Reimagined: Leveraging Data In The Privacy Era<\/title>\n<meta name=\"description\" content=\"Usercentrics presents a webinar on how secure data is gained by IoT devices &amp; other future-oriented technologies. Find out how this data can be used here.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy World Reimagined: Leveraging Data In The Privacy Era\" \/>\n<meta property=\"og:description\" content=\"How secure is data gained by IoT devices &amp; other future-oriented technologies? How can this data be used? Learn approaches to take to comply with privacy laws.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/\" \/>\n<meta property=\"og:site_name\" content=\"Usercentrics - US\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/usercentrics\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-11T12:22:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/usercentrics.com\/wp-content\/uploads\/2022\/03\/Webinar-Landscape-privacy-reimagened-scaled.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Privacy World Reimagined: Leveraging Data In The Privacy Era\" \/>\n<meta name=\"twitter:description\" content=\"How secure is data gained by IoT devices &amp; other future-oriented technologies? How can this data be used? Learn approaches to take to comply with privacy laws.\" \/>\n<meta name=\"twitter:site\" content=\"@usercentrics\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/\",\"url\":\"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/\",\"name\":\"Privacy World Reimagined: Leveraging Data In The Privacy Era\",\"isPartOf\":{\"@id\":\"https:\/\/usercentrics.com\/us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/usercentrics.com\/us\/wp-content\/uploads\/sites\/7\/2022\/06\/Asset-13.svg?v=d92839d0bbedc42c\",\"datePublished\":\"2022-04-05T14:04:12+00:00\",\"dateModified\":\"2024-09-11T12:22:18+00:00\",\"description\":\"Usercentrics presents a webinar on how secure data is gained by IoT devices & other future-oriented technologies. Find out how this data can be used here.\",\"breadcrumb\":{\"@id\":\"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":\"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/\"}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/#primaryimage\",\"url\":\"https:\/\/usercentrics.com\/us\/wp-content\/uploads\/sites\/7\/2022\/06\/Asset-13.svg?v=d92839d0bbedc42c\",\"contentUrl\":\"https:\/\/usercentrics.com\/us\/wp-content\/uploads\/sites\/7\/2022\/06\/Asset-13.svg?v=d92839d0bbedc42c\",\"width\":445,\"height\":139,\"copyrightNotice\":\"\u00a9 Copyright 2026 Usercentrics GmbH\",\"creator\":{\"@type\":\"Organization\",\"name\":\"Usercentrics GmbH\"},\"creditText\":\"Image: Usercentrics GmbH\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Resources\",\"item\":\"https:\/\/usercentrics.com\/us\/resources\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Events\",\"item\":\"https:\/\/usercentrics.com\/us\/webinar\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Privacy World reimagined: How to leverage data with the future of privacy\",\"item\":\"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/usercentrics.com\/us\/#website\",\"url\":\"https:\/\/usercentrics.com\/us\/\",\"name\":\"Usercentrics - US\",\"description\":\"Consent Management Platform (CMP) Usercentrics\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/usercentrics.com\/us\/?s={search_term_string}\"}}],\"inLanguage\":\"en-US\"}]}<\/script>","yoast_head_json":{"title":"Privacy World Reimagined: Leveraging Data In The Privacy Era","description":"Usercentrics presents a webinar on how secure data is gained by IoT devices & other future-oriented technologies. Find out how this data can be used here.","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Privacy World Reimagined: Leveraging Data In The Privacy Era","og_description":"How secure is data gained by IoT devices & other future-oriented technologies? How can this data be used? Learn approaches to take to comply with privacy laws.","og_url":"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/","og_site_name":"Usercentrics - US","article_publisher":"https:\/\/www.facebook.com\/usercentrics","article_modified_time":"2024-09-11T12:22:18+00:00","og_image":[{"url":"https:\/\/usercentrics.com\/wp-content\/uploads\/2022\/03\/Webinar-Landscape-privacy-reimagened-scaled.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_title":"Privacy World Reimagined: Leveraging Data In The Privacy Era","twitter_description":"How secure is data gained by IoT devices & other future-oriented technologies? How can this data be used? Learn approaches to take to comply with privacy laws.","twitter_site":"@usercentrics","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/","url":"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/","name":"Privacy World Reimagined: Leveraging Data In The Privacy Era","isPartOf":{"@id":"https:\/\/usercentrics.com\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/#primaryimage"},"image":{"@id":"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/#primaryimage"},"thumbnailUrl":"https:\/\/usercentrics.com\/us\/wp-content\/uploads\/sites\/7\/2022\/06\/Asset-13.svg?v=d92839d0bbedc42c","datePublished":"2022-04-05T14:04:12+00:00","dateModified":"2024-09-11T12:22:18+00:00","description":"Usercentrics presents a webinar on how secure data is gained by IoT devices & other future-oriented technologies. Find out how this data can be used here.","breadcrumb":{"@id":"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/"}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/#primaryimage","url":"https:\/\/usercentrics.com\/us\/wp-content\/uploads\/sites\/7\/2022\/06\/Asset-13.svg?v=d92839d0bbedc42c","contentUrl":"https:\/\/usercentrics.com\/us\/wp-content\/uploads\/sites\/7\/2022\/06\/Asset-13.svg?v=d92839d0bbedc42c","width":445,"height":139,"copyrightNotice":"\u00a9 Copyright 2026 Usercentrics GmbH","creator":{"@type":"Organization","name":"Usercentrics GmbH"},"creditText":"Image: Usercentrics GmbH"},{"@type":"BreadcrumbList","@id":"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Resources","item":"https:\/\/usercentrics.com\/us\/resources\/"},{"@type":"ListItem","position":2,"name":"Events","item":"https:\/\/usercentrics.com\/us\/webinar\/"},{"@type":"ListItem","position":3,"name":"Privacy World reimagined: How to leverage data with the future of privacy","item":"https:\/\/usercentrics.com\/us\/events\/privacy-world-reimagined\/"}]},{"@type":"WebSite","@id":"https:\/\/usercentrics.com\/us\/#website","url":"https:\/\/usercentrics.com\/us\/","name":"Usercentrics - US","description":"Consent Management Platform (CMP) Usercentrics","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/usercentrics.com\/us\/?s={search_term_string}"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/usercentrics.com\/us\/wp-json\/wp\/v2\/event\/535","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/usercentrics.com\/us\/wp-json\/wp\/v2\/event"}],"about":[{"href":"https:\/\/usercentrics.com\/us\/wp-json\/wp\/v2\/types\/event"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/usercentrics.com\/us\/wp-json\/wp\/v2\/media\/5615"}],"wp:attachment":[{"href":"https:\/\/usercentrics.com\/us\/wp-json\/wp\/v2\/media?parent=535"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/usercentrics.com\/us\/wp-json\/wp\/v2\/tags?post=535"},{"taxonomy":"magazine_issue","embeddable":true,"href":"https:\/\/usercentrics.com\/us\/wp-json\/wp\/v2\/magazine_issue?post=535"},{"taxonomy":"magazine_tag","embeddable":true,"href":"https:\/\/usercentrics.com\/us\/wp-json\/wp\/v2\/magazine_tag?post=535"},{"taxonomy":"resource_tag","embeddable":true,"href":"https:\/\/usercentrics.com\/us\/wp-json\/wp\/v2\/resource_tag?post=535"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}