article thumbnail

New China Guideline for Internet Personal Information Security Protection

Data Protection Report

On 30 November 2018 the Cyber Security Protection Bureau, under the auspices of the PRC Ministry of Public Security (the “MPS”), issued a draft Guideline for Internet Personal Information Security Protection (the “Guideline”) along with a request for public comments. Introduction. technical measures; and. Management Mechanisms.

article thumbnail

Security in the finance sector: Whose role is it anyway?

CGI

Security in the finance sector: Whose role is it anyway? From a finance sector perspective, the chief information security officer (CISO) bears much responsibility, but Forester’s has a suggestion for CISOs, “Stop trying so hard.” Empower the business side to meet client needs while also meeting required security standards.

IT 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Movement on Section 702 of the Foreign Intelligence Surveillance Act (FISA)

Data Matters

First enacted in 2008, Section 702 is a surveillance law that permits the targeting of foreign individuals overseas. person query in certain circumstances—specifically, if the query was in connection with a criminal investigation unrelated to national security and not designed to find foreign intelligence information.

Privacy 68
article thumbnail

Hello. Goodbye… Goodbye. Hello

ARMA International

The first is that ever since 2008, corporate clients are much more cost-conscious and in pursuit of the best available deal. So, caution should be exercised. Electronic material needs to be encrypted and uploaded to a place where it can be securely downloaded by the onboarding firm. Why is there more matter mobility now?

article thumbnail

UK Parliament Calls for Prison Sentences for Data Theft

Hunton Privacy

The Committee stated in its October 18, 2011 report that the current penalties for unlawfully obtaining personal data (under Section 55 of the DPA) are an inadequate deterrent, and urged the government to exercise its power to introduce prison sentences without delay.

article thumbnail

Navigating Interactions Between Investment Advisers and Their Portfolio Companies: Risks and Best Practices

Data Matters

Securities and Exchange Commission’s (the SEC) examination and enforcement programs. DO exercise great caution in relying on conclusions about the materiality of any potential MNPI. 17, 2008), [link]. 5510 (May 26, 2020), [link]. Cuban, No. 08-cv-2050 (N.D. Longoria et al. , 11-cv-0753 (JSR) (S.D.N.Y. 8, 2011), [link].

Risk 76
article thumbnail

Data strategy in three steps: Inside Collibra’s Data Office

Collibra

We’ve come a long way from our startup days in 2008. However, most organizations today are still trying to distinguish between a defensive stance (ensure compliance and security) and an offensive posture (leverage data assets to derive value). . This is crucial business context and the data strategy needs to fit into that.