Remove 2011 Remove Examples Remove Exercises Remove Security
article thumbnail

Navigating Interactions Between Investment Advisers and Their Portfolio Companies: Risks and Best Practices

Data Matters

Securities and Exchange Commission’s (the SEC) examination and enforcement programs. For example, the Investment Group may have an employee serving on the board of directors of the company or a shareholder committee. Investment Groups may also obtain MNPI as part of the investment process.

Risk 76
article thumbnail

California Enacts Broad Privacy Laws Modeled on GDPR

Data Matters

identifiers such as a real name, alias, postal address, unique personal identifier, online identifier, internet protocol address, email address, account name, Social Security number, driver’s license number or passport number. Businesses cannot discriminate against consumers who exercise any of their rights under AB 375.

GDPR 79
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California Enacts Broad Privacy Protections Modeled on GDPR

Data Matters

identifiers such as a real name, alias, postal address, unique personal identifier, online identifier, internet protocol address, email address, account name, Social Security number, driver’s license number or passport number. Businesses cannot discriminate against consumers who exercise any of their rights under AB 375.

GDPR 60
article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

In this episode I talk about how Heartbleed (CVE 2014-0160) was found and also interview Rauli Kaksonen, someone who was at Codenomicon at the time of its discovery and is now a senior security specialist at the University of Oulu in Finland, about how new security tools are still needed to find the next big zero day. Apple Podcasts.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

In this episode I talk about how Heartbleed (CVE 2014-0160) was found and also interview Rauli Kaksonen, someone who was at Codenomicon at the time of its discovery and is now a senior security specialist at the University of Oulu in Finland, about how new security tools are still needed to find the next big zero day. Apple Podcasts.

article thumbnail

European Commission Outlines Strategy for Revision of the Data Protection Directive

Hunton Privacy

Rights of the data subjects: improving the ways in which individuals can exercise their rights, for example, by introducing deadlines to respond to individuals’ requests and strengthening the “right to be forgotten” ( i.e. , the right for individuals to have their data deleted when they are no longer needed for legitimate purposes).

article thumbnail

Together, we can make a difference

Scary Beasts Security

It was an interesting exercise, of course with an ulterior motive! After this year, Tavis Ormandy's famous Flash security rampage landed (80+ fixes), with follow-up patches such as 7 fixes here. For example, the Internet Bug Bounty includes Flash as a category. I previously blogged about $10,000 example here.

IT 20