Remove category enforcement
article thumbnail

California Enacts Broad Privacy Laws Modeled on GDPR

Data Matters

Nonetheless, and despite the California legislators’ ostensible effort to achieve compromise, the new legislation requires disclosure, access, deletion, portability and enforcement far in excess of what U.S. Specific categories defined as personal information include. biometric information. geolocation data. education information.

GDPR 79
article thumbnail

California Enacts Broad Privacy Protections Modeled on GDPR

Data Matters

Nonetheless, and despite the California legislators’ ostensible effort to achieve compromise, the new legislation requires disclosure, access, deletion, portability and enforcement far in excess of what U.S. Specific categories defined as personal information include. biometric information. geolocation data. education information.

GDPR 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HHS Issues New Model Privacy Notice for PHR Vendors

Hunton Privacy

On September 12, 2011, the Department of Health and Human Services’ Office of the National Coordinator for Health Information Technology (“ONC”) unveiled a model privacy notice for personal health records (the “PHR Model Privacy Notice”).

Privacy 40
article thumbnail

European Commission Presents Evaluation Report on Telecommunications Data Retention

Hunton Privacy

On April 18, 2011, the European Commission (the “Commission”) adopted an Evaluation Report on the EU Data Retention Directive 2006/24/EC (the “Data Retention Directive”). Narrowing the categories of data to be retained. Providing guidance on technical and organizational security measures for access to data.

article thumbnail

The ICO Updates Its Data Sharing Code of Practice

HL Chronicle of Data Protection

On 9 July 2019 the UK data protection authority (ICO) updated its Data Sharing Code of Practice (first published in 2011) (Code). The Code mainly covers data sharing by private organisations subject to the GDPR and Part 2 of the DPA, but it also includes a specific section on data sharing under the Law Enforcement regime (Part 3 of the DPA).

GDPR 40
article thumbnail

2018 eDiscovery Case Law Year in Review, Part 2

eDiscovery Daily

After Woman’s iPhone is Seized and She Sues, Homeland Security Agrees to Delete Her Data : In the case Lazoja v. Here’s a new category – rulings by courts to order parties to conduct sampling to settle production disputes. 2011: Part 1 , Part 2 , Part 3 , Part 4. 2011: Part 1 , Part 2 , Part 3 , Part 4. Stay tuned!

Sales 55
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Thus, common tools and techniques are risk matrices, risk registers, risk logs, risk breakdown structures, risk categories, Monte Carlo simulations, and sensitivity analyses. law enforcement agencies recovered most of the bitcoin paid in ransomware. In May 2021, Colonial Pipeline paid $ 4.4 In this case, U.S. 2020, p 1).