Remove category health-privacy
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This part also discusses managing CS risks such as ransomware, privacy, change management, and user adoption. Thus, common tools and techniques are risk matrices, risk registers, risk logs, risk breakdown structures, risk categories, Monte Carlo simulations, and sensitivity analyses. Many organizations have business case templates.

article thumbnail

California Enacts Broad Privacy Laws Modeled on GDPR

Data Matters

Jerry Brown signed into law the California Consumer Privacy Act of 2018 (AB 375). This legislation was enacted on an extraordinarily accelerated timeframe as part of compromise with the sponsor of a comparable privacy ballot initiative, which had qualified to be placed before state voters on Election Day in November 2018.

GDPR 79
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California Enacts Broad Privacy Protections Modeled on GDPR

Data Matters

Jerry Brown signed into law the California Consumer Privacy Act of 2018 (AB 375). This legislation was enacted on an extraordinarily accelerated timeframe as part of compromise with the sponsor of a comparable privacy ballot initiative, which had qualified to be placed before state voters on Election Day in November 2018.

GDPR 60
article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

Banks must still be allowed to process data to prevent fraud; regulators must still be allowed to process data to investigate malpractice and corruption; sports governing bodies must be allowed to process data to keep the cheats out; and journalists must still be able to investigate scandal and malpractice. change it substantially.

GDPR 120
article thumbnail

India Drafts New Privacy Regulations

Hunton Privacy

On April 11, 2011, India adopted new privacy regulations, known as the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (the “Rules”). The Rules impose a number of additional obligations on organizations, as summarized below.

Privacy 40
article thumbnail

Regulatory Update: NAIC Fall 2019 National Meeting

Data Matters

In 2016, in connection with the NAIC’s efforts to establish standards governing reserve financing arrangements involving term life and universal life insurance policies with secondary guarantees, the CFR Model Laws were amended and the new Term and Universal Life Insurance Reserve Financing Model Regulation was adopted.

article thumbnail

Regulatory Update: NAIC Fall 2019 National Meeting

Data Matters

In 2016, in connection with the NAIC’s efforts to establish standards governing reserve financing arrangements involving term life and universal life insurance policies with secondary guarantees, the CFR Model Laws were amended and the new Term and Universal Life Insurance Reserve Financing Model Regulation was adopted.