Remove category enforcement
article thumbnail

The Myth of Consumer-Grade Security

Schneier on Security

Yet that's not possible, because there is no longer any difference between those categories of devices. They affect national security. And it would be foolish to weaken them, even at the request of law enforcement. They're critical to national security as well as personal security.

Military 102
article thumbnail

New White House Announcement on the Vulnerability Equities Process

Schneier on Security

This is the inter-agency process by which the US government decides whether to inform the software vendor of a vulnerability it finds, or keep it secret and use it to eavesdrop on or attack other systems. The White House has released a new version of the Vulnerabilities Equities Process (VEP).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malaysian Data Protection Law Takes Effect

Hunton Privacy

On November 14, 2013, the Minister of the Malaysian Communications and Multimedia Commission (the “Minister”) announced that Malaysia’s Personal Data Protection Act 2010 (the “Act”) would be going into effect as of November 15, marking the end of years of postponements. The law imposes cross-border transfer restrictions.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

Banks must still be allowed to process data to prevent fraud; regulators must still be allowed to process data to investigate malpractice and corruption; sports governing bodies must be allowed to process data to keep the cheats out; and journalists must still be able to investigate scandal and malpractice. change it substantially.

GDPR 120
article thumbnail

Records Inventory 101:

ARMA International

Among these management issues are insufficient documentation of official acts, incorrect use of recordkeeping technologies, poor filing systems and maintenance standards, poor management of non-record items, insufficient identification of vital records, and insufficient records security policies. Is the DOD 9/30/2010 or 10/01/2010?

article thumbnail

The Burden of Privacy In Discovery

Data Matters

Although these proportionality factors began as an integral part of the definition of the scope of discovery, for more than two decades these limitations resided in a separate subsection of the Rule, resulting in considerable confusion and less-than-rigorous enforcement. The principle of proportionality in civil discovery is hardly new.4

Privacy 97
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Thus, common tools and techniques are risk matrices, risk registers, risk logs, risk breakdown structures, risk categories, Monte Carlo simulations, and sensitivity analyses. Take the example of the pandemic: only some governments engaged pandemic experts to develop actions plans. Figure 3: Digital capability levels. In this case, U.S.