Remove Computer and Electronics Remove GDPR Remove Government Remove Insurance
article thumbnail

2019 end-of-year review part 1: January to June

IT Governance

IT Governance is closing out the year by rounding up 2019’s biggest information security stories. IT Governance released its final Weekly Podcast. The US Oversight and Reform Committee learned that Donald Trump’s son-in-law/senior adviser, Jared Kushner, was using WhatsApp to conduct government business.

article thumbnail

China’s PIPL has finally arrived, and brings helpful clarification (rather than substantial change) to China’s data privacy framework

DLA Piper Privacy Matters

To be clear, this is not China’s own GDPR. Definition of Personal information and Sensitive Personal information “Personal information” means any kind of information relating to an identified or identifiable natural person, either electronically or otherwise recorded, but excluding information that has been de-identified or anonymised.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Saudi Arabia’s New Data Protection Law – What you need to know

DLA Piper Privacy Matters

While the PDPL contains the main features of a modern data protection law, it cannot be considered a direct analogue of the GDPR. However the PDPL itself does not refer to a concept of processing for “legitimate interests” in the same manner as the GDPR, and indeed as other data protection frameworks in the region allow for.

article thumbnail

#ModernDataMasters: Henrik Liliendahl, Chairman & CTO, Product Data Lake

Reltio

I got good grades in mathematics at school but it was an evening class in secondary school that I took in what was then called EDP (Electronic Data Processing) that got me started. We didn’t even have a computer at that school so the whole class was about things drawn on the blackboard.

MDM 49
article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

When we do the weekly supermarket shop online, we should be able to move our shopping list electronically. Perhaps the Government could respond on that point. When a consumer wants to move to a new energy supplier, they should be able to take their usage history with them rather than guess and pay over the odds.

GDPR 120
article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 January 2024

IT Governance

Compromised data includes victims’ names, addresses, phone numbers and Aadhaar numbers (a 12-digit government identification number). It remains unclear how the data breach occurred, but the attackers apparently suggested it was the result of “exploiting vulnerabilities within government databases of telecommunication systems”.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. Take the example of the pandemic: only some governments engaged pandemic experts to develop actions plans. Figure 3: Digital capability levels. Cloud-first “Mind-shift”. 2020, p 6).