article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

Another example is when sensitive information is removed from transaction data after meeting operational requirements, but the data is kept for analytical processing such as market research and trend analysis. Booking online and getting e-tickets and confirmations on a smart phone are normal. e-Discovery.

article thumbnail

New UK Online Behavioral Advertising Code Released

Hunton Privacy

Article 5(3) of the amended EU e-Privacy Directive (Directive 2002/58/EC as amended by Directive 2009/136/EC) requires that users must be provided with “clear and comprehensive information” and must give their prior informed opt-in consent before any cookies are set on their “terminal equipment” ( e.g. , computer or mobile device).

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Born from e-commerce giant Alibaba Group in Hangzhou, China, the cloud services provider offers content delivery networks (CDN), data storage, and relational database management in a scalable infrastructure. Also read our in-depth analysis of the formerly named Imperva SecureSphere. Read our in-depth review of IBM Guardium.

Security 114