article thumbnail

Weekly podcast: Dixons Carphone, Fashion Nexus, Yale and Alaska

IT Governance

I want to assure them that we remain fully committed to making their personal data safe with us.”. The ICO’s investigation is ongoing and it’s still not clear whether the 1998 Data Protection Act or its replacement, the GDPR (General Data Protection Regulation), will apply. Well, that’ll do for this week.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

The new right to be forgotten will allow children to enjoy their childhood without having every personal event, achievement, failure, antic or prank that they posted online to be digitally recorded for ever more. Of course, as new rights like this are created, the Bill will ensure that they cannot be taken too far.

GDPR 120
article thumbnail

The History of Malware: A Primer on the Evolution of Cyber Threats

IBM Big Data Hub

However, some adware might harvest personal data or redirect web browsers to malicious websites. 2007: Zeus virus First identified in 2007, Zeus infected personal computers via phishing and drive-by-downloads and demonstrated the dangerous potential of a trojan-style virus that can deliver many different types of malicious software.