Remove 2005 Remove Government Remove Information Security Remove Privacy
article thumbnail

India Drafts New Privacy Regulations

Hunton Privacy

On April 11, 2011, India adopted new privacy regulations, known as the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (the “Rules”). The Rules impose a number of additional obligations on organizations, as summarized below.

Privacy 40
article thumbnail

New York Enacts Stricter Data Cybersecurity Laws

Data Matters

Together, the new laws require the implementation of reasonable data security safeguards, expand breach reporting obligations for certain types of information, and require that a “consumer credit reporting agency” that suffers a data breach provide five years of identity theft prevention services for impacted residents.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NERC $10,000,000 Fine of Public Utility Highlights the Need for Cybersecurity Preparedness and CIP Compliance Programs

Data Matters

FERC, which has the final say over the Settlement Agreement pursuant to authorities set forth in the Energy Policy Act of 2005, 16 USCA § 824o (b)(1), has 30 days to make its determination. There is no indication that FERC will not approve it. Addressing cybersecurity risks increasingly is becoming a primary focus of the agency.

article thumbnail

Liability for Data Security Auditors

Hunton Privacy

The offer was contingent upon CardSystems achieving certification under VISA’s Cardholder Information Security Program (“CISP”), which is the predecessor to the Payment Card Industry Data Security Standard (“PCI DSS”). Data security auditors would likely increase the price of audits to account for the increased risk.

article thumbnail

FFIEC Guidance on Authentication and Access to Financial Institution Services and Systems

Data Matters

The Guidance is not intended to serve as a comprehensive framework but rather provides financial institutions with examples of effective risk management practices without endorsing any specific information security framework or standard. The 2005 guidance replaced a 2001 version of the same document.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. Starting with her first desktop on a Unix machine at age 12, Eva Galperin’s contributions to cybersecurity include research on malware and privacy. Carey | @marcusjcarey.

article thumbnail

List of Data Breaches and Cyber Attacks in 2023

IT Governance

Meanwhile, you can subscribe to our Weekly Round-up to receive the latest cyber security news and advice delivered straight to your inbox. IT Governance is dedicated to helping organisations tackle the threat of cyber crime and other information security weaknesses.