article thumbnail

European Union Implements Changes to Export Control Rules

Data Matters

Dual-use items have both military and civil applications. Providing technical assistance will require authorization if related to listed dual-use items intended for certain specific military uses, with the possibility for EU Member States to extend these requirements to non-listed dual-use items.

article thumbnail

Thanks AIIM—This Isn’t Goodbye

AIIM

It was 2009 and the recession was killing membership dues revenue at every association. From there, others began answering member questions, volunteering to share on webinars, forming new communities to focus on challenging issues from GDPR and Privacy issues to Women In Information Management.

ECM 146
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. Cyber Security Draws the Attention of the White House and Congress

Hunton Privacy

In a global economy, where economic strength and technological leadership are as important to national power as military force, failing to secure cyberspace puts the U.S. The failure threatens the safety and well-being of the United States and its allies and raises immediate risks for the economy. at a disadvantage.

article thumbnail

New European Union Dual-Use Regulation Enters Into Force

Data Matters

As from September 9, 2021, Regulation (EU) 2021/821 ( EU Dual-Use Regulation Recast ) replaces the existing Council Regulation (EC) 428/2009 setting up the European Union (EU) regime for the control of exports, transfer, brokering, and transit of “dual-use” items ( EU Dual-Use Regulation ). New controls on technical assistance.

article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Application developers managing sensitive user data must especially beware of increasing regulatory action surrounding data privacy. Not every application or network requires military-grade encryption – however, enterprise organizations can’t go wrong with the services offering the most strength. The Move to HTTPS.

article thumbnail

MY TAKE: Rising geopolitical tensions suggest a dire need for tighter cybersecurity in 2024

The Last Watchdog

and Israel, 2005 – 2010,) Operation Aurora (China, 2009,) the Sony Pictures hack (North Korea, 2015,) and WannaCry (North Korea, 2017.) Regulators are responding by implementing stricter data privacy and supply chain security standards. It’s not just Russia. This means company leaders must do their due diligence.

article thumbnail

MY TAKE: How state-backed cyber ops have placed the world in a constant-state ‘Cyber Pearl Harbor’

The Last Watchdog

That May 10th air strike by the Israel Defense Force marked the first use of military force in direct retaliation for cyber spying. This comes as no surprise to anyone in the military or intelligence communities. nuclear arsenal in 2003 • Breaches of computers at the Department of Commerce in 2006 • Hacking of military systems at U.S.

IoT 171