article thumbnail

CIPL Releases Report on Effective Data Privacy Accountability

Hunton Privacy

On June 3, 2020, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP published its report, What Good and Effective Data Privacy Accountability Looks Like: Mapping Organizations’ Practices to the CIPL Accountability Framework (“Report”). Canada, Europe, Asia-Pacific and Latin America.

article thumbnail

CIPL Publishes New White Paper on the Approach of British Columbia, Canada to Cross-Border Data Transfers by Public Sector Bodies

Hunton Privacy

On June 10, 2022, the Centre for Information Policy Leadership at Hunton Andrews Kurth published a white paper entitled “ Local Law Assessments and Online Services – Refining the Approach to Beneficial and Privacy-Protective Cross-Border Data Flows A: Case Study from British Columbia.”

Paper 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Looking Back on the Channel Partner Event and Awards 2024

IT Governance

Panel discussion After Bridget’s presentation and a half-hour networking break, we came to our panel discussion: “Beyond the Checkbox: Driving real value in cyber security and privacy management”. Bridget Kenyon’s keynote on AI and its challenges for information security was particularly illuminating and engaging.

Sales 59
article thumbnail

Sophie Sayer on the IT Governance Partner Programme

IT Governance

In more recent months, we launched the channel partner programme in Europe and America, with training and security testing proving especially popular. We are the market leader in data privacy and cyber security risk management solutions, so it makes sense to partner with us. What is it that makes IT Governance special?

article thumbnail

UK ICO Publishes New Report on Neurotechnology and Warns of “Real Danger” of  Discrimination

Hunton Privacy

The ICO is in the process of developing guidance on the topic, which will, among other things, consider the interpretation of core legislative and technical neurotechnology definitions, link to existing ICO guidance where appropriate, and provide case studies.

Risk 55
article thumbnail

Security Affairs newsletter Round 258

Security Affairs

addresses two zero-days exploited in the wild Microsofts case study: Emotet took down an entire network in just 8 days New Coronavirus-themed campaign spread Lokibot worldwide. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

article thumbnail

1,859 Android and iOS apps were containing hard-coded Amazon AWS credentials

Security Affairs

In some cases, the presence of the access keys has no specific reason, in other cases, they are part of testing and never removed code. The problem is that the SDK included cloud infrastructure keys embedded used to access the translation service.

Cloud 97