<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>ICIT (Institute for Critical Infrastructure Technology)</provider_name><provider_url>https://icitech.org</provider_url><author_name>ICIT</author_name><author_url>https://icitech.org/author/admin/</author_url><title>ICIT Fellow Perspective - Privacy Law for Security Professionals - ICIT (Institute for Critical Infrastructure Technology)</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="fGPi1opBlY"&gt;&lt;a href="https://icitech.org/icit-fellow-perspective-privacy-law-for-security-professionals/"&gt;ICIT Fellow Perspective &#x2013; Privacy Law for Security Professionals&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://icitech.org/icit-fellow-perspective-privacy-law-for-security-professionals/embed/#?secret=fGPi1opBlY" width="600" height="338" title="&#x201C;ICIT Fellow Perspective &#x2013; Privacy Law for Security Professionals&#x201D; &#x2014; ICIT (Institute for Critical Infrastructure Technology)" data-secret="fGPi1opBlY" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/*! This file is auto-generated */
!function(c,l){"use strict";var e=!1,o=!1;if(l.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(/[^a-zA-Z0-9]/.test(t.secret));else{for(var r,s,a,i=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),n=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),o=0;o&lt;n.length;o++)n[o].style.display="none";for(o=0;o&lt;i.length;o++)if(r=i[o],e.source!==r.contentWindow);else{if(r.removeAttribute("style"),"height"===t.message){if(1e3&lt;(s=parseInt(t.value,10)))s=1e3;else if(~~s&lt;200)s=200;r.height=s}if("link"===t.message)if(s=l.createElement("a"),a=l.createElement("a"),s.href=r.getAttribute("src"),a.href=t.value,a.host===s.host)if(l.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener("message",c.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",t,!1),c.addEventListener("load",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf("MSIE 10"),a=!!navigator.userAgent.match(/Trident.*rv:11\./),i=l.querySelectorAll("iframe.wp-embedded-content"),n=0;n&lt;i.length;n++){if(!(r=(t=i[n]).getAttribute("data-secret")))r=Math.random().toString(36).substr(2,10),t.src+="#?secret="+r,t.setAttribute("data-secret",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute("security"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:"ready",secret:r},"*")}}}}(window,document);
&lt;/script&gt;
</html><thumbnail_url>https://icitech.org/wp-content/uploads/2020/04/ICIT-Fellow-Perspective-Kirk-Nahra-Cover.png</thumbnail_url><thumbnail_width>433</thumbnail_width><thumbnail_height>572</thumbnail_height><description>In this ICIT Fellow Perspective essay, Kirk Nahra (ICIT Fellow and Partner, WilmerHale) details the key principles in modern privacy law, which privacy laws are most important to the security community, how privacy law applies to security professionals, and how to think about vital security issues in the context of privacy law</description></oembed>
